<?xml version="1.0" encoding="UTF-8"?>
<ds:data-stream-collection xmlns:ds="http://scap.nist.gov/schema/scap/source/1.2" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cat="urn:oasis:names:tc:entity:xmlns:xml:catalog" id="scap_org.open-scap_collection_from_xccdf_ssg-sle12-xccdf-1.2.xml" schematron-version="1.2">
  <ds:data-stream id="scap_org.open-scap_datastream_from_xccdf_ssg-sle12-xccdf-1.2.xml" scap-version="1.2" use-case="OTHER">
    <ds:dictionaries>
      <ds:component-ref id="scap_org.open-scap_cref_ssg-sle12-cpe-dictionary.xml" xlink:href="#scap_org.open-scap_comp_ssg-sle12-cpe-dictionary.xml">
        <cat:catalog>
          <cat:uri name="ssg-sle12-cpe-oval.xml" uri="#scap_org.open-scap_cref_ssg-sle12-cpe-oval.xml"/>
        </cat:catalog>
      </ds:component-ref>
    </ds:dictionaries>
    <ds:checklists>
      <ds:component-ref id="scap_org.open-scap_cref_ssg-sle12-xccdf-1.2.xml" xlink:href="#scap_org.open-scap_comp_ssg-sle12-xccdf-1.2.xml">
        <cat:catalog>
          <cat:uri name="ssg-sle12-oval.xml" uri="#scap_org.open-scap_cref_ssg-sle12-oval.xml"/>
          <cat:uri name="ssg-sle12-ocil.xml" uri="#scap_org.open-scap_cref_ssg-sle12-ocil.xml"/>
        </cat:catalog>
      </ds:component-ref>
    </ds:checklists>
    <ds:checks>
      <ds:component-ref id="scap_org.open-scap_cref_ssg-sle12-oval.xml" xlink:href="#scap_org.open-scap_comp_ssg-sle12-oval.xml"/>
      <ds:component-ref id="scap_org.open-scap_cref_ssg-sle12-ocil.xml" xlink:href="#scap_org.open-scap_comp_ssg-sle12-ocil.xml"/>
      <ds:component-ref id="scap_org.open-scap_cref_ssg-sle12-cpe-oval.xml" xlink:href="#scap_org.open-scap_comp_ssg-sle12-cpe-oval.xml"/>
    </ds:checks>
  </ds:data-stream>
  <ds:component id="scap_org.open-scap_comp_ssg-sle12-oval.xml" timestamp="2019-04-18T11:25:44">
    <oval:oval_definitions xmlns:ns2="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:ns3="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:ns4="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:ns5="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
      <oval:generator>
        <ns2:product_name>combine_ovals.py from SCAP Security Guide</ns2:product_name>
        <ns2:product_version>ssg: [0, 1, 44], python: 3.7.2</ns2:product_version>
        <ns2:schema_version>5.11</ns2:schema_version>
        <ns2:timestamp>2019-04-18T09:25:33</ns2:timestamp>
      </oval:generator>
      <oval:definitions>
        <oval:definition class="compliance" id="oval:ssg-ftp_present_banner:def:1" version="1">
          <oval:metadata>
            <oval:title>Banner for FTP Users</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This setting will cause the system greeting banner to be 
      used for FTP connections as well.</oval:description>
            <oval:reference ref_id="ftp_present_banner" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_removed:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="/etc/issue has banner" definition_ref="oval:ssg-banner_etc_issue:def:1"/>
              <oval:criterion comment="Banner for FTP Users" test_ref="oval:ssg-test_ftp_present_banner:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-postfix_client_configure_mail_alias:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure root has a mail alias</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check if root has the correct mail alias.</oval:description>
            <oval:reference ref_id="postfix_client_configure_mail_alias" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Check if root has the correct mail alias.">
            <oval:criterion comment="Check if root has the correct mail alias." test_ref="oval:ssg-test_postfix_client_configure_mail_alias:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_insecure_locks_exports:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure insecure_locks is disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Allowing insecure file locking could allow for sensitive 
      data to be viewed or edited by an unauthorized user.</oval:description>
            <oval:reference ref_id="no_insecure_locks_exports" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for insecure NFS locks in /etc/exports" test_ref="oval:ssg-test_no_insecure_locks_exports:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-chronyd_or_ntpd_set_maxpoll:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure Time Service Maxpoll Interval</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Configure the maxpoll setting in /etc/ntp.conf or chrony.conf
      to continuously poll the time source servers.</oval:description>
            <oval:reference ref_id="chronyd_or_ntpd_set_maxpoll" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="rpm package ntp installed" definition_ref="oval:ssg-package_ntp_installed:def:1"/>
              <oval:criterion comment="check if maxpoll is set in /etc/ntp.conf" test_ref="oval:ssg-test_ntp_set_maxpoll:tst:1"/>
              <oval:criterion comment="check if all server entries have maxpoll set in /etc/ntp.conf" test_ref="oval:ssg-test_ntp_all_server_has_maxpoll:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="rpm package chrony installed" definition_ref="oval:ssg-package_chrony_installed:def:1"/>
              <oval:criterion comment="check if maxpoll is set in /etc/chrony.conf" test_ref="oval:ssg-test_chrony_set_maxpoll:tst:1"/>
              <oval:criterion comment="check if all server entries have maxpoll set in /etc/chrony.conf" test_ref="oval:ssg-test_chrony_all_server_has_maxpoll:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_host_based_files:def:1" version="1">
          <oval:metadata>
            <oval:title>No shosts.equiv file deployed on the system</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>There should not be any shosts.equiv files on the system.</oval:description>
            <oval:reference ref_id="no_host_based_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion test_ref="oval:ssg-test_no_shosts_equiv:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_user_host_based_files:def:1" version="1">
          <oval:metadata>
            <oval:title>No .shosts file deployed on the system</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>There should not be any .shosts files on the system.</oval:description>
            <oval:reference ref_id="no_user_host_based_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion test_ref="oval:ssg-test_no_shosts:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_smb_client_signing:def:1" version="1">
          <oval:metadata>
            <oval:title>Require Client SMB Packet Signing, if using
      mount.cifs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Require packet signing of clients who mount
      Samba shares using the mount.cifs program (e.g., those who
      specify shares in /etc/fstab). To do so, ensure that signing
      options (either sec=krb5i or sec=ntlmv2i) are
      used.</oval:description>
            <oval:reference ref_id="mount_option_smb_client_signing" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="samba-common installed" definition_ref="oval:ssg-package_samba-common_installed:def:1"/>
              <oval:criteria operator="OR">
                <oval:criterion comment="check for no cifs in /etc/fstab" test_ref="oval:ssg-test_20340111:tst:1"/>
                <oval:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" test_ref="oval:ssg-test_20340112:tst:1"/>
              </oval:criteria>
              <oval:criteria operator="OR">
                <oval:criterion comment="check for no cifs in /etc/mtab" test_ref="oval:ssg-test_20340113:tst:1"/>
                <oval:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" test_ref="oval:ssg-test_20340114:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-snmpd_not_default_password:def:1" version="2">
          <oval:metadata>
            <oval:title>SNMP default communities disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SNMP default communities must be removed.</oval:description>
            <oval:reference ref_id="snmpd_not_default_password" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1"/>
            <oval:criterion comment="SNMP communities" test_ref="oval:ssg-test_snmp_default_communities:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-snmpd_use_newer_protocol:def:1" version="2">
          <oval:metadata>
            <oval:title>SNMP use newer protocols</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SNMP version 1 and 2c must not be enabled.</oval:description>
            <oval:reference ref_id="snmpd_use_newer_protocol" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1"/>
            <oval:criterion comment="SNMP protocols" test_ref="oval:ssg-test_snmp_versions:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-disable_host_auth:def:1" version="2">
          <oval:metadata>
            <oval:title>Disable Host-Based Authentication</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSH host-based authentication should be disabled.</oval:description>
            <oval:reference ref_id="disable_host_auth" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check HostbasedAuthentication in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_hostbasedauthentication:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_disable_compression:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable Compression Or Set Compression to delayed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSH should either have compression disabled or set to delayed.</oval:description>
            <oval:reference ref_id="sshd_disable_compression" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check Compression in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_disable_compression:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_disable_empty_passwords:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable Empty Passwords</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Remote connections from accounts with empty passwords should
      be disabled (and dependencies are met)</oval:description>
            <oval:reference ref_id="sshd_disable_empty_passwords" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check PermitEmptyPasswords in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitemptypasswords_no:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_disable_rhosts_rsa:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable SSH Support for Rhosts RSA Authentication</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSH can allow authentication through the obsolete rsh command
      through the use of the authenticating user's SSH keys. This should be disabled.</oval:description>
            <oval:reference ref_id="sshd_disable_rhosts_rsa" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criteria comment="SSH version is equal or higher than 7.4 has deprecated RhostsRSAAuthentication" operator="OR">
                <oval:extend_definition comment="OpenSSH version 7.4 or higher has deprecated RhostsRSAAuthentication" definition_ref="oval:ssg-sshd_version_equal_or_higher_than_74:def:1"/>
                <oval:criterion comment="Check RhostsRSAAuthentication in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_disable_root_login:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable root Login via SSH</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Root login via SSH should be disabled (and dependencies are
      met)</oval:description>
            <oval:reference ref_id="sshd_disable_root_login" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check PermitRootLogin in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitrootlogin_no:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_disable_user_known_hosts:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable SSH Support for User Known Hosts</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSH can allow system users host-based authentication
to connect to systems if a cache of the remote systems public keys are available.
This should be disabled.</oval:description>
            <oval:reference ref_id="sshd_disable_user_known_hosts" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check IgnoreUserKnownHosts in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_disable_user_known_hosts:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_do_not_permit_user_env:def:1" version="1">
          <oval:metadata>
            <oval:title>Do Not Allow Users to Set Environment Options</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>PermitUserEnvironment should be disabled</oval:description>
            <oval:reference ref_id="sshd_do_not_permit_user_env" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check PermitUserEnvironment in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_no_user_envset:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_enable_strictmodes:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable SSH Server's Strict Mode</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable StrictMode to check users home directory permissions
and configurations.</oval:description>
            <oval:reference ref_id="sshd_enable_strictmodes" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check StrictModes in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_enable_strictmodes:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_enable_warning_banner:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable a Warning Banner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSH warning banner should be enabled (and dependencies are
      met)</oval:description>
            <oval:reference ref_id="sshd_enable_warning_banner" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="/etc/issue has banner" definition_ref="oval:ssg-banner_etc_issue:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check Banner in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_banner_set:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_enable_x11_forwarding:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable X11 Forwarding</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable X11Forwarding to encrypt X11 remote connections over SSH.</oval:description>
            <oval:reference ref_id="sshd_enable_x11_forwarding" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check X11Forwarding in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_enable_x11_forwarding:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_print_last_log:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable Print Last Log</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable PrintLastLog to display user's last login time 
and date.</oval:description>
            <oval:reference ref_id="sshd_print_last_log" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check PrintLastLog in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_enable_printlastlog:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_set_idle_timeout:def:1" version="1">
          <oval:metadata>
            <oval:title>Set OpenSSH Idle Timeout Interval</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SSH idle timeout interval should be set to an
      appropriate value.</oval:description>
            <oval:reference ref_id="sshd_set_idle_timeout" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check ClientAliveInterval in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_idle_timeout:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_set_keepalive:def:1" version="1">
          <oval:metadata>
            <oval:title>Set ClientAliveCountMax for User Logins</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SSH ClientAliveCountMax should be set to an appropriate
      value (and dependencies are met)</oval:description>
            <oval:reference ref_id="sshd_set_keepalive" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check ClientAliveCountMax in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_clientalivecountmax:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_set_loglevel_info:def:1" version="1">
          <oval:metadata>
            <oval:title>Set OpenSSH LogLevel to INFO</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SSH LogLevel should be set to INFO.</oval:description>
            <oval:reference ref_id="sshd_set_loglevel_info" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is not being used or conditions are met" operator="OR">
            <oval:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1"/>
            <oval:criterion comment="Check LogLevel in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_set_loglevel_info:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_set_max_auth_tries:def:1" version="1">
          <oval:metadata>
            <oval:title>Set OpenSSH authentication attempt limit (MaxAuthTries)</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SSH MaxAuthTries should be set to an
      appropriate value.</oval:description>
            <oval:reference ref_id="sshd_set_max_auth_tries" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is not being used or conditions are met" operator="OR">
            <oval:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1"/>
            <oval:criterion comment="Check MaxAuthTries in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_max_auth_tries:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_use_approved_ciphers:def:1" version="1">
          <oval:metadata>
            <oval:title>Use Only Approved Ciphers</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Limit the ciphers to those which are FIPS-approved.</oval:description>
            <oval:reference ref_id="sshd_use_approved_ciphers" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is FIPS certified" definition_ref="oval:ssg-installed_OS_is_FIPS_certified:def:1"/>
            <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
              <oval:criteria comment="sshd is not installed" operator="AND">
                <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
                <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
              </oval:criteria>
              <oval:criteria comment="sshd is installed and configured" operator="AND">
                <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
                <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
                <oval:criterion comment="Check the Cipers list in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_ciphers:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_use_approved_macs:def:1" version="1">
          <oval:metadata>
            <oval:title>Use Only FIPS MACs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Limit the Message Authentication Codes (MACs) to those which are FIPS-approved.</oval:description>
            <oval:reference ref_id="sshd_use_approved_macs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is FIPS certified" definition_ref="oval:ssg-installed_OS_is_FIPS_certified:def:1"/>
            <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
              <oval:criteria comment="sshd is not installed" operator="AND">
                <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
                <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
              </oval:criteria>
              <oval:criteria comment="sshd is installed and configured" operator="AND">
                <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
                <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
                <oval:criterion comment="Check MACs in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_macs:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_use_priv_separation:def:1" version="1">
          <oval:metadata>
            <oval:title>Use Priviledge Separation</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Use priviledge separation to cause the SSH process to drop
root privileges when not needed.</oval:description>
            <oval:reference ref_id="sshd_use_priv_separation" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is configured correctly or is not installed" operator="OR">
            <oval:criteria comment="sshd is not installed" operator="AND">
              <oval:extend_definition comment="sshd is not required or requirement is unset" definition_ref="oval:ssg-sshd_not_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            </oval:criteria>
            <oval:criteria comment="sshd is installed and configured" operator="AND">
              <oval:extend_definition comment="sshd is required or requirement is unset" definition_ref="oval:ssg-sshd_required_or_unset:def:1"/>
              <oval:extend_definition comment="rpm package openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
              <oval:criterion comment="Check UsePrivilegeSeparation in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_priv_separation:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_set_loglevel_verbose:def:1" version="1">
          <oval:metadata>
            <oval:title>Set OpenSSH LogLevel to VERBOSE</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SSH LogLevel should be set to VERBOSE.</oval:description>
            <oval:reference ref_id="sshd_set_loglevel_verbose" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH is not being used or conditions are met" operator="OR">
            <oval:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1"/>
            <oval:criterion comment="Check LogLevel in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_set_loglevel_verbose:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sssd_memcache_timeout:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure SSSD's Memory Cache to Expire</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSSD's memory cache should be configured to set to expire records after 1 day.</oval:description>
            <oval:reference ref_id="sssd_memcache_timeout" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="OR">
              <oval:extend_definition comment="Check if sssd service is disabled" definition_ref="oval:ssg-service_sssd_disabled:def:1"/>
              <oval:extend_definition comment="Check if /etc/sssd/sssd.conf is configured for usage" definition_ref="oval:ssg-sssd_conf_exists:def:1" negate="true"/>
            </oval:criteria>
            <oval:criterion comment="Check memcache_timeout in /etc/sssd/sssd.conf" test_ref="oval:ssg-test_sssd_memcache_timeout:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sssd_offline_cred_expiration:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure SSSD to Expire Offline Credentials</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>SSSD should be configured to expire offline credentials after 1 day.</oval:description>
            <oval:reference ref_id="sssd_offline_cred_expiration" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="OR">
              <oval:extend_definition comment="Check if /etc/sssd/sssd.conf is configured for usage" definition_ref="oval:ssg-sssd_conf_exists:def:1" negate="true"/>
            </oval:criteria>
            <oval:criterion comment="Check offline_credentials_expiration in /etc/sssd/sssd.conf" test_ref="oval:ssg-test_sssd_offline_cred_expiration:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-banner_etc_issue:def:1" version="2">
          <oval:metadata>
            <oval:title>System Login Banner Compliance</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The system login banner text should be set correctly.</oval:description>
            <oval:reference ref_id="banner_etc_issue" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="/etc/issue is set appropriately" test_ref="oval:ssg-test_banner_etc_issue:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-banner_etc_motd:def:1" version="2">
          <oval:metadata>
            <oval:title>System Login Banner Compliance</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The system login banner text should be set correctly.</oval:description>
            <oval:reference ref_id="banner_etc_motd" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="/etc/motd is set appropriately" test_ref="oval:ssg-test_banner_etc_motd:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dconf_gnome_banner_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable GNOME3 Login Warning Banner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable the GNOME3 Login warning banner.</oval:description>
            <oval:reference ref_id="dconf_gnome_banner_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true"/>
            <oval:extend_definition comment="dconf installed" definition_ref="oval:ssg-package_dconf_installed:def:1" negate="true"/>
            <oval:criteria comment="Enable GUI banner and prevent user from changing it" operator="AND">
              <oval:extend_definition comment="dconf user profile exists" definition_ref="oval:ssg-enable_dconf_user_profile:def:1"/>
              <oval:criterion comment="Enable GUI banner" test_ref="oval:ssg-test_banner_gui_enabled:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dconf_gnome_login_banner_text:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable GUI Warning Banner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable the GUI warning banner.</oval:description>
            <oval:reference ref_id="dconf_gnome_login_banner_text" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true"/>
            <oval:extend_definition comment="dconf installed" definition_ref="oval:ssg-package_dconf_installed:def:1" negate="true"/>
            <oval:criteria comment="Enable GUI banner and prevent user from changing it" operator="AND">
              <oval:extend_definition comment="dconf user profile exists" definition_ref="oval:ssg-enable_dconf_user_profile:def:1"/>
              <oval:criterion comment="Login banner is correctly set" test_ref="oval:ssg-test_gdm_login_banner_text_setting:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-gui_login_dod_acknowledgement:def:1" version="1">
          <oval:metadata>
            <oval:title>The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access to the local graphical user interface (GUI).</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.</oval:description>
            <oval:reference ref_id="gui_login_dod_acknowledgement" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true"/>
            <oval:criteria comment="GUI Banner acknowledgement" operator="AND">
              <oval:criterion comment="GUI Banner acknowledgement is active" test_ref="oval:ssg-test_banner_gui_acknowledgement:tst:1"/>
              <oval:criterion comment="/etc/gdm/Xsession world executable and owned by root" test_ref="oval:ssg-test_banner_gui_acknowledgement_exec:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-banner_etc_gdm_banner:def:1" version="2">
          <oval:metadata>
            <oval:title>System GUI Login Banner Compliance</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The system login banner text should be set correctly.</oval:description>
            <oval:reference ref_id="banner_etc_gdm_banner" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true"/>
            <oval:criteria operator="AND">
              <oval:criterion comment="/etc/gdm/banner is set appropriately" test_ref="oval:ssg-test_banner_etc_gdm_banner:tst:1"/>
              <oval:criterion comment="/etc/gdm/banner is world-readable" test_ref="oval:ssg-test_banner_etc_gdm_banner_readable:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-display_login_attempts:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Last Login/Access Notification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Configure the system to notify users of last login/access using pam_lastlog.</oval:description>
            <oval:reference ref_id="display_login_attempts" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Conditions for pam_lastlog are satisfied" test_ref="oval:ssg-test_display_login_attempts:tst:1"/>
            <oval:criterion comment="silent option for pam_lastlog is set" test_ref="oval:ssg-test_display_login_attempts_silent:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-faildelay:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Last Login/Access Notification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Configure the system to notify users of last login/access using pam_lastlog.</oval:description>
            <oval:reference ref_id="faildelay" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Conditions for pam_faildelay are satisfied" test_ref="oval:ssg-test_faildelay:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-pam_disable_automatic_configuration:def:1" version="1">
          <oval:metadata>
            <oval:title>The PAM configuration should not be changed automatically</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Verify the SUSE operating system is configured to not overwrite Pluggable
    Authentication Modules (PAM) configuration on package changes.</oval:description>
            <oval:reference ref_id="pam_disable_automatic_configuration" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="/etc/pam.d/common-* are not symbolic links" test_ref="oval:ssg-test_pam_disable_automatic_configuration:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_password_pam_unix_remember:def:1" version="2">
          <oval:metadata>
            <oval:title>Limit Password Reuse</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The passwords to remember should be set correctly.</oval:description>
            <oval:reference ref_id="accounts_password_pam_unix_remember" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="remember parameter of pam_unix.so or pam_pwhistory.so is set correctly" operator="AND">
            <oval:criterion comment="use_authtok parameter of pam_pwhistory.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_pwhistory_use_authtok:tst:1"/>
            <oval:criterion comment="remember parameter of pam_pwhistory.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_deny:def:1" version="4">
          <oval:metadata>
            <oval:title>Lock out account after failed login attempts</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The number of allowed failed logins should be set correctly.</oval:description>
            <oval:reference ref_id="accounts_passwords_pam_faillock_deny" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Checks common to both scenarios" operator="AND">
            <oval:criterion comment="pam_faillock.so preauth silent set in system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1"/>
            <oval:criterion comment="pam_faillock.so set in account phase of system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1"/>
            <oval:criterion comment="pam_faillock.so preauth silent set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1"/>
            <oval:criterion comment="pam_faillock.so set in account phase of password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1"/>
            <oval:criteria operator="AND">
              <oval:criteria comment="system-auth" operator="OR">
                <oval:criterion comment="Perform check if pam_faillock authfail follows pam_unix even with lines skipped" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_numeric_default_check_system-auth:tst:1"/>
                <oval:criterion comment="Perform check if pam_faillock authfail follows pam_unix with either sufficient or default=ignore" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1"/>
              </oval:criteria>
              <oval:criteria comment="password-auth" operator="OR">
                <oval:criterion comment="Perform check if pam_faillock authfail follows pam_unix even with lines skipped" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_numeric_default_check_password-auth:tst:1"/>
                <oval:criterion comment="pam_faillock.so authfail deny value set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_passwords_pam_tally2:def:1" version="4">
          <oval:metadata>
            <oval:title>Lock out account after failed login attempts</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The number of allowed failed logins should be set correctly.</oval:description>
            <oval:reference ref_id="accounts_passwords_pam_tally2" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Checks common to both scenarios" operator="AND">
            <oval:criterion comment="Verify deny configuation of pam_tally2 in common-auth" test_ref="oval:ssg-test_accounts_passwords_pam_tally2_deny_auth:tst:1"/>
            <oval:criterion comment="Verify deny configuation of pam_tally2 in common-account" test_ref="oval:ssg-test_accounts_passwords_pam_tally2_deny_account:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_dcredit:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Strength Minimum Digit Characters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "dcredit=" parameter controls requirements for
    usage of digits in a password. When set to a negative number, any password will be required to
    contain that many uppercase characters.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_dcredit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify dcredit is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_dcredit:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_difok:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Strength Minimum Different Characters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "difok" parameter controls requirements for
    usage of different characters during a password change.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_difok" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify difok is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_difok:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_lcredit:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Strength Minimum Lowercase Characters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "lcredit=" parameter controls requirements for
        usage of lowercase letters in a password. When set to a negative number, any password will be required to
        contain that many lowercase characters.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_lcredit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify lcredit is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_lcredit:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_minlen:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Minimum Length</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "minlen=" parameter controls requirements for
    the minimum length of a password.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_minlen" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify minlen is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_minlen:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_ocredit:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Strength Minimum Special Characters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "ocredit=" parameter controls requirements for
    usage of special (or "other") characters in a password. When set to a negative number, any password will be required to
    contain that many special characters.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_ocredit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify ocredit is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_ocredit:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-cracklib_accounts_password_pam_ucredit:def:1" version="4">
          <oval:metadata>
            <oval:title>Set Password Strength Minimum Uppercase Characters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pam_cracklib module's "ucredit=" parameter controls requirements for
    usage of uppercase letters in a password. When set to a negative number, any password will be required to
    contain that many uppercase characters.</oval:description>
            <oval:reference ref_id="cracklib_accounts_password_pam_ucredit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Verify ucredit is set to the desired value" test_ref="oval:ssg-test_cracklib_accounts_password_pam_ucredit:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" version="2">
          <oval:metadata>
            <oval:title>Set SHA512 Password Hashing Algorithm in /etc/login.defs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password hashing algorithm should be set correctly in /etc/login.defs.</oval:description>
            <oval:reference ref_id="set_password_hashing_algorithm_logindefs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_etc_login_defs_encrypt_method:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.</oval:description>
            <oval:reference ref_id="set_password_hashing_algorithm_systemauth" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_pam_unix_sha512:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-set_password_hashing_min_rounds_logindefs:def:1" version="2">
          <oval:metadata>
            <oval:title>Set Password Hashing Minimum Rounds in /etc/login.defs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password hashing minimum rounds should be set correctly in /etc/login.defs.</oval:description>
            <oval:reference ref_id="set_password_hashing_min_rounds_logindefs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:criterion test_ref="oval:ssg-test_etc_login_defs_sha_crypt_min_rounds:tst:1"/>
              <oval:criterion test_ref="oval:ssg-test_etc_login_defs_sha_crypt_max_rounds:tst:1"/>
            </oval:criteria>
            <oval:criterion negate="true" test_ref="oval:ssg-test_etc_login_defs_sha_crypt_min_or_max_rounds:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_commonauth:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Password Hashing Algorithm in /etc/pam.d/common-auth</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password hashing algorithm should be set correctly in /etc/pam.d/common-auth.</oval:description>
            <oval:reference ref_id="set_password_hashing_algorithm_commonauth" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_pam_unix_sha512_auth:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-disable_ctrlaltdel_reboot:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable Ctrl-Alt-Del Reboot Activation</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>By default, the system will reboot when the
      Ctrl-Alt-Del key sequence is pressed.</oval:description>
            <oval:reference ref_id="disable_ctrlaltdel_reboot" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Disable Ctrl-Alt-Del systemd softlink exists" test_ref="oval:ssg-test_disable_ctrlaltdel_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-vlock_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure vlock Command is Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check if the vlock command is installed.</oval:description>
            <oval:reference ref_id="vlock_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Check vlock or kbd Package is installed" operator="OR">
            <oval:extend_definition comment="Package vlock is installed" definition_ref="oval:ssg-package_vlock_installed:def:1"/>
            <oval:extend_definition comment="Package kbd is installed" definition_ref="oval:ssg-package_kbd_installed:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_smartcard_packages:def:1" version="1">
          <oval:metadata>
            <oval:title>Install needed packages for smartcard use.</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The required RPM packages must be installed.</oval:description>
            <oval:reference ref_id="install_smartcard_packages" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="packages for smartcard use are installed">
            <oval:extend_definition comment="pam_pkcs11 package is installed" definition_ref="oval:ssg-package_pam_pkcs11_installed:def:1"/>
            <oval:extend_definition comment="mozilla-nss package is installed" definition_ref="oval:ssg-package_mozilla-nss_installed:def:1"/>
            <oval:extend_definition comment="mozilla-nss-tools package is installed" definition_ref="oval:ssg-package_mozilla-nss-tools_installed:def:1"/>
            <oval:extend_definition comment="pcsc-ccid package is installed" definition_ref="oval:ssg-package_pcsc-ccid_installed:def:1"/>
            <oval:extend_definition comment="pcsc-lite package is installed" definition_ref="oval:ssg-package_pcsc-lite_installed:def:1"/>
            <oval:extend_definition comment="pcsc-tools package is installed" definition_ref="oval:ssg-package_pcsc-tools_installed:def:1"/>
            <oval:extend_definition comment="opensc package is installed" definition_ref="oval:ssg-package_opensc_installed:def:1"/>
            <oval:extend_definition comment="coolkey package is installed" definition_ref="oval:ssg-package_coolkey_installed:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-smartcard_configure_cert_checking:def:1" version="3">
          <oval:metadata>
            <oval:title>Enable Smart Card Login</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable Smart Card logins</oval:description>
            <oval:reference ref_id="smartcard_configure_cert_checking" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="smart card authentication is configured" operator="AND">
            <oval:extend_definition comment="pam_pkcs11 package is installed" definition_ref="oval:ssg-package_pam_pkcs11_installed:def:1"/>
            <oval:criterion comment="cert_policy directive contains oscp_on" test_ref="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-smartcard_pam_enabled:def:1" version="3">
          <oval:metadata>
            <oval:title>Enable Smart Card Login in PAM</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable Smart Card logins using PAM</oval:description>
            <oval:reference ref_id="smartcard_pam_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="smart card authentication is configured">
            <oval:criterion comment="smart card is configured in /etc/pam.d/common-auth" test_ref="oval:ssg-test_smart_card_common_auth:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-smartcard_configure_ca:def:1" version="3">
          <oval:metadata>
            <oval:title>Enable Smart Card CA Checks</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Enable Smart Card CA Checks</oval:description>
            <oval:reference ref_id="smartcard_configure_ca" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="smart card authentication is configured" operator="AND">
            <oval:extend_definition comment="pam_pkcs11 package is installed" definition_ref="oval:ssg-package_pam_pkcs11_installed:def:1"/>
            <oval:criterion comment="cert_policy directive contains ca" test_ref="oval:ssg-test_pam_pkcs11_cert_policy_ca:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-account_unique_id:def:1" version="1">
          <oval:metadata>
            <oval:title>Set All Accounts To Have Unique IDs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All accounts on the system should have unique IDs for proper accountability.</oval:description>
            <oval:reference ref_id="account_unique_id" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="There should not exist duplicate user IDs entries in /etc/passwd">
            <oval:criterion test_ref="oval:ssg-test_etc_passwd_no_duplicate_user_ids:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-account_disable_post_pw_expiration:def:1" version="2">
          <oval:metadata>
            <oval:title>Set Accounts to Expire Following Password Expiration</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The accounts should be configured to expire automatically following password expiration.</oval:description>
            <oval:reference ref_id="account_disable_post_pw_expiration" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd">
            <oval:criterion test_ref="oval:ssg-test_etc_default_useradd_inactive:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-account_unique_name:def:1" version="1">
          <oval:metadata>
            <oval:title>Set All Accounts To Have Unique Names</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All accounts on the system should have unique names for proper accountability.</oval:description>
            <oval:reference ref_id="account_unique_name" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="There should not exist duplicate user name entries in /etc/passwd">
            <oval:criterion test_ref="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-account_minimum_age_shadow:def:1" version="2">
          <oval:metadata>
            <oval:title>Set Accounts to Expire Following Password Expiration</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The accounts should be configured to expire automatically following password expiration.</oval:description>
            <oval:reference ref_id="account_minimum_age_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="no accounts should have a minimum password lifetime of 0">
            <oval:criterion test_ref="oval:ssg-test_account_passwords_minimum_lifetime:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-account_maximum_age_shadow:def:1" version="2">
          <oval:metadata>
            <oval:title>Set Accounts to Expire Following Password Expiration</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The accounts should be configured to expire automatically following password expiration.</oval:description>
            <oval:reference ref_id="account_maximum_age_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="no accounts should have a maximum password lifetime of 0">
            <oval:criterion test_ref="oval:ssg-test_account_passwords_maximum_lifetime:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_maximum_age_login_defs:def:1" version="3">
          <oval:metadata>
            <oval:title>Set Password Expiration Parameters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The maximum password age policy should meet minimum requirements.</oval:description>
            <oval:reference ref_id="accounts_maximum_age_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="The value PASS_MAX_DAYS should be set appropriately in /etc/login.defs">
            <oval:criterion test_ref="oval:ssg-test_pass_max_days:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_minimum_age_login_defs:def:1" version="3">
          <oval:metadata>
            <oval:title>Set Password Expiration Parameters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The minimum password age policy should be set appropriately.</oval:description>
            <oval:reference ref_id="accounts_minimum_age_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs">
            <oval:criterion test_ref="oval:ssg-test_pass_min_days:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_password_minlen_login_defs:def:1" version="3">
          <oval:metadata>
            <oval:title>Set Password Expiration Parameters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password minimum length should be set appropriately.</oval:description>
            <oval:reference ref_id="accounts_password_minlen_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_pass_min_len:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_password_warn_age_login_defs:def:1" version="3">
          <oval:metadata>
            <oval:title>Set Password Expiration Parameters</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The password expiration warning age should be set appropriately.</oval:description>
            <oval:reference ref_id="accounts_password_warn_age_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion test_ref="oval:ssg-test_pass_warn_age:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_password_all_shadowed:def:1" version="1">
          <oval:metadata>
            <oval:title>All Password Hashes Shadowed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All password hashes should be shadowed.</oval:description>
            <oval:reference ref_id="accounts_password_all_shadowed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="password hashes are shadowed" test_ref="oval:ssg-test_accounts_password_all_shadowed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_empty_passwords:def:1" version="1">
          <oval:metadata>
            <oval:title>No nullok Option in PAM configuration</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The PAM configuration should not contain the nullok option</oval:description>
            <oval:reference ref_id="no_empty_passwords" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="make sure the nullok option is not used in PAM configuration" test_ref="oval:ssg-test_no_empty_passwords:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_netrc_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify No netrc Files Exist</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The .netrc files contain login information used to auto-login into FTP servers and reside in the user's home directory. Any .netrc files should be removed.</oval:description>
            <oval:reference ref_id="no_netrc_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion negate="true" test_ref="oval:ssg-test_no_netrc_files_home:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_password_all_shadowed_sha512:def:1" version="1">
          <oval:metadata>
            <oval:title>All Password Hashes Shadowed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All password hashes should be shadowed.</oval:description>
            <oval:reference ref_id="accounts_password_all_shadowed_sha512" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="password hashes are shadowed using sha512" test_ref="oval:ssg-test_accounts_password_all_shadowed_sha512:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_no_uid_except_zero:def:1" version="1">
          <oval:metadata>
            <oval:title>UID 0 Belongs Only To Root</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Only the root account should be assigned a user id of 0.</oval:description>
            <oval:reference ref_id="accounts_no_uid_except_zero" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="tests that there are no accounts with UID 0 except root in the /etc/passwd file" test_ref="oval:ssg-test_accounts_no_uid_except_root:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_direct_root_logins:def:1" version="1">
          <oval:metadata>
            <oval:title>Direct root Logins Not Allowed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Preventing direct root logins help ensure accountability for actions
      taken on the system using the root account.</oval:description>
            <oval:reference ref_id="no_direct_root_logins" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_no_direct_root_logins:tst:1"/>
            <oval:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_etc_securetty_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_shelllogin_for_systemaccounts:def:1" version="2">
          <oval:metadata>
            <oval:title>System Accounts Do Not Run a Shell</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The root account is the only system account that should have
      a login shell.</oval:description>
            <oval:reference ref_id="no_shelllogin_for_systemaccounts" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:criterion comment="Test SYS_UID_MIN not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1"/>
              <oval:criterion comment="Test SYS_UID_MAX not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1"/>
              <oval:criterion comment="Test shell defined for UID from &lt;0, UID_MIN -1&gt;" test_ref="oval:ssg-test_shell_defined_default_uid_range:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:criterion comment="Test SYS_UID_MIN defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1"/>
              <oval:criterion comment="Test SYS_UID_MAX defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1"/>
              <oval:criterion comment="Test shell defined for reserved system UIDs" test_ref="oval:ssg-test_shell_defined_reserved_uid_range:tst:1"/>
              <oval:criterion comment="Test shell defined for dynamically allocated system UIDs" test_ref="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-restrict_serial_port_logins:def:1" version="1">
          <oval:metadata>
            <oval:title>Restrict Serial Port Root Logins</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Preventing direct root login to serial port interfaces helps
      ensure accountability for actions taken on the system using the root
      account.</oval:description>
            <oval:reference ref_id="restrict_serial_port_logins" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="serial ports /etc/securetty" negate="true" test_ref="oval:ssg-test_serial_ports_etc_securetty:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-securetty_root_login_console_only:def:1" version="1">
          <oval:metadata>
            <oval:title>Restrict Virtual Console Root Logins</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Preventing direct root login to virtual console devices
      helps ensure accountability for actions taken on the system using the
      root account.</oval:description>
            <oval:reference ref_id="securetty_root_login_console_only" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="virtual consoles /etc/securetty" test_ref="oval:ssg-test_virtual_consoles_etc_securetty:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_have_homedir_login_defs:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure new users receive home directories</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>CREATE_HOME should be enabled</oval:description>
            <oval:reference ref_id="accounts_have_homedir_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Check CREATE_HOME in /etc/login.defs" test_ref="oval:ssg-test_accounts_have_homedir_login_defs:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_logon_fail_delay:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure that FAIL_DELAY is Configured in /etc/login.defs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The delay between failed authentication attempts should be
      set for all users specified in /etc/login.defs</oval:description>
            <oval:reference ref_id="accounts_logon_fail_delay" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion test_ref="oval:ssg-test_accounts_logon_fail_delay:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_max_concurrent_login_sessions:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Maximum Number of Concurrent Login Sessions Per User</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The maximum number of concurrent login sessions per user should meet
      minimum requirements.</oval:description>
            <oval:reference ref_id="accounts_max_concurrent_login_sessions" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" test_ref="oval:ssg-test_limitsd_maxlogins:tst:1"/>
            <oval:criteria operator="AND">
              <oval:criterion comment="the value maxlogins should not be set at all in /etc/security/limits.d/*.conf" negate="true" test_ref="oval:ssg-test_limitsd_maxlogins_exists:tst:1"/>
              <oval:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" test_ref="oval:ssg-test_maxlogins:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_tmout:def:1" version="3">
          <oval:metadata>
            <oval:title>Set Interactive Session Timeout</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks interactive shell timeout</oval:description>
            <oval:reference ref_id="accounts_tmout" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="TMOUT value in /etc/profile &gt;= var_accounts_tmout" test_ref="oval:ssg-test_etc_profile_tmout:tst:1"/>
            <oval:criterion comment="TMOUT value in /etc/profile.d/*.sh &gt;= var_accounts_tmout" test_ref="oval:ssg-test_etc_profiled_tmout:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_user_interactive_home_directory_defined:def:1" version="1">
          <oval:metadata>
            <oval:title>All Interactive Users Home Directories Must be Defined</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check for home directories of interactive users that currently do not have a home directory assigned.</oval:description>
            <oval:reference ref_id="accounts_user_interactive_home_directory_defined" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for home directories of interactive users that currently do not have a home directory assigned." test_ref="oval:ssg-test_accounts_user_interactive_home_directory_defined:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_user_interactive_home_directory_exists:def:1" version="1">
          <oval:metadata>
            <oval:title>All Interactive Users Home Directories Must Exist</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check for home directories of interactive users that currently do not have a home directory assigned.</oval:description>
            <oval:reference ref_id="accounts_user_interactive_home_directory_exists" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for home directories of interactive users that currently do not have a home directory assigned." test_ref="oval:ssg-test_user_interactive_home_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permission_user_init_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure All User Initialization Files Have Mode 0740 Or Less Permissive</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Ensure All User Initialization Files Have Mode 0740 Or Less Permissive</oval:description>
            <oval:reference ref_id="file_permission_user_init_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Check permissions of hidden files in home directory of interactive users" test_ref="oval:ssg-test_file_permissions_user_init_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_home_directories:def:1" version="1">
          <oval:metadata>
            <oval:title>All Interactive User Home Directories Must Have mode 0750 Or Less Permissive</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All Interactive Users Home Directories Must Have mode 0750 or Less Permissive.</oval:description>
            <oval:reference ref_id="file_permissions_home_directories" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for home directories of interactive users with too lax permissions." test_ref="oval:ssg-test_file_permissions_home_directories:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_home_dirs:def:1" version="1">
          <oval:metadata>
            <oval:title>Proper Permissions User Home Directories</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>File permissions should be set correctly for the home directories for all user accounts.</oval:description>
            <oval:reference ref_id="file_permissions_home_dirs" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="home directories" negate="true" test_ref="oval:ssg-test_file_permissions_home_dirs:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_root_path_dirs_no_write:def:1" version="2">
          <oval:metadata>
            <oval:title>Write permissions are disabled for group and other in all
      directories in Root's Path</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check each directory in root's path and make use it does
      not grant write permission to group and other</oval:description>
            <oval:reference ref_id="accounts_root_path_dirs_no_write" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Check that write permission to group and other in root's path is denied">
            <oval:criterion comment="Check for write permission to group and other in root's path" test_ref="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_umask_etc_login_defs:def:1" version="2">
          <oval:metadata>
            <oval:title>Ensure that Users Have Sensible Umask Values in /etc/login.defs</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The default umask for all users specified in /etc/login.defs</oval:description>
            <oval:reference ref_id="accounts_umask_etc_login_defs" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1"/>
            <oval:criterion test_ref="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group_augen:tst:1"/>
              <oval:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_augen:tst:1"/>
              <oval:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_augen:tst:1"/>
              <oval:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_augen:tst:1"/>
              <oval:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_augen:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group_auditctl:tst:1"/>
              <oval:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_auditctl:tst:1"/>
              <oval:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_auditctl:tst:1"/>
              <oval:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_auditctl:tst:1"/>
              <oval:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification_group:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification_group" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group_augen_group:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group_auditctl_group:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification_gshadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification_gshadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_augen_gshadow:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_auditctl_gshadow:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification_opasswd:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification_opasswd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_augen_opasswd:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_auditctl_opasswd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_augen_passwd:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_auditctl_passwd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification_shadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit User/Group Modification</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should detect modification to system files that hold information about users and groups.</oval:description>
            <oval:reference ref_id="audit_rules_usergroup_modification_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_augen_shadow:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_auditctl_shadow:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_ownership_var_log_audit:def:1" version="3">
          <oval:metadata>
            <oval:title>Verify /var/log/audit Ownership</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks that all /var/log/audit files and directories are owned by the root user and group.</oval:description>
            <oval:reference ref_id="file_ownership_var_log_audit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria comment="directories are root owned" operator="AND">
              <oval:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files:tst:1"/>
              <oval:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories:tst:1"/>
            </oval:criteria>
            <oval:criteria comment="log_group in auditd.conf is not root" operator="AND">
              <oval:extend_definition comment="log_group in auditd.conf is not root" definition_ref="oval:ssg-auditd_conf_log_group_not_root:def:1"/>
              <oval:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1"/>
              <oval:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_suid_privilege_function:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure </oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>checks for an audit rule for every suid binary</oval:description>
            <oval:reference ref_id="audit_rules_suid_privilege_function" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="checks for an audit rule in rules.d for every suid binary" test_ref="oval:ssg-test_audit_rules_suid_privilege_function:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_enable_syscall_auditing:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable Syscall Auditing</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Syscall auditing should not be disabled.</oval:description>
            <oval:reference ref_id="audit_rules_enable_syscall_auditing" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="check that no audit rule exists in /etc/audit/rules.d/*.rules that disables all syscall auditing" test_ref="oval:ssg-test_enable_syscall_audit_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="check that no audit rule exists in /etc/audit/audit.rules that disables all syscall auditing" test_ref="oval:ssg-test_enable_syscall_audit_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_kernel_module_loading_delete:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Kernel Module Loading and Unloading - delete_module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The audit rules should be configured to log information about kernel module loading and unloading.</oval:description>
            <oval:reference ref_id="audit_rules_kernel_module_loading_delete" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit delete_module" test_ref="oval:ssg-test_32bit_ardm_delete_module_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit delete_module" test_ref="oval:ssg-test_64bit_ardm_delete_module_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit delete_module" test_ref="oval:ssg-test_32bit_ardm_delete_module_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit delete_module" test_ref="oval:ssg-test_64bit_ardm_delete_module_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_kernel_module_loading_finit:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Kernel Module Loading and Unloading - finit_module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The audit rules should be configured to log information about kernel module loading and unloading.</oval:description>
            <oval:reference ref_id="audit_rules_kernel_module_loading_finit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit finit_module" test_ref="oval:ssg-test_32bit_ardm_finit_module_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit finit_module" test_ref="oval:ssg-test_64bit_ardm_finit_module_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit finit_module" test_ref="oval:ssg-test_32bit_ardm_finit_module_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit finit_module" test_ref="oval:ssg-test_64bit_ardm_finit_module_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_kernel_module_loading_init:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Kernel Module Loading and Unloading - init_module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The audit rules should be configured to log information about kernel module loading and unloading.</oval:description>
            <oval:reference ref_id="audit_rules_kernel_module_loading_init" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit init_module" test_ref="oval:ssg-test_32bit_ardm_init_module_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit init_module" test_ref="oval:ssg-test_64bit_ardm_init_module_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit init_module" test_ref="oval:ssg-test_32bit_ardm_init_module_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit init_module" test_ref="oval:ssg-test_64bit_ardm_init_module_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_audispd_configure_remote_server:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure audispd Plugin Remote Server IP address or Hostname</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>remote_server setting in /etc/audisp/audisp-remote.conf is set to a certain IP address or hostname</oval:description>
            <oval:reference ref_id="auditd_audispd_configure_remote_server" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="remote_server setting in audisp-remote.conf" test_ref="oval:ssg-test_auditd_audispd_configure_remote_server:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_audispd_disk_full_action:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure audispd's Plugin disk_full_action When Disk Is Full</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>disk_full_action setting in /etc/audisp/audisp-remote.conf is set to an acceptable value</oval:description>
            <oval:reference ref_id="auditd_audispd_disk_full_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="disk_full_action setting in audisp-remote.conf" test_ref="oval:ssg-test_auditd_audispd_configure_disk_full_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_audispd_encrypt_sent_records:def:1" version="1">
          <oval:metadata>
            <oval:title>Kerberos 5 Authentication and Encryption in Audit Event Multiplexor (audispd) Is Activated</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>enable_krb5 setting in /etc/audisp/audisp-remote.conf is set to 'yes'</oval:description>
            <oval:reference ref_id="auditd_audispd_encrypt_sent_records" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="setting in audisp-remote.conf" test_ref="oval:ssg-test_auditd_audispd_encrypt_sent_records:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_audispd_network_failure_action:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure audispd's Plugin network_failure_action On Network Failure</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>network_failure_action setting in /etc/audisp/audisp-remote.conf is set to an acceptable value</oval:description>
            <oval:reference ref_id="auditd_audispd_network_failure_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="network_failure_action setting in audisp-remote.conf" test_ref="oval:ssg-test_auditd_audispd_configure_network_failure_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" version="1">
          <oval:metadata>
            <oval:title>The syslog Plugin Of the Audit Event Multiplexor (audispd) Is Activated</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>active setting in /etc/audisp/plugins.d/syslog.conf is set to 'yes'</oval:description>
            <oval:reference ref_id="auditd_audispd_syslog_plugin_activated" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="active setting in syslog.conf" test_ref="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_disk_error_action:def:1" version="1">
          <oval:metadata>
            <oval:title>Auditd Action to Take When Disk Errors</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>disk_error_action setting in /etc/audit/auditd.conf is set to a certain action</oval:description>
            <oval:reference ref_id="auditd_data_disk_error_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="disk_error_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_disk_error_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_disk_full_action:def:1" version="1">
          <oval:metadata>
            <oval:title>Auditd Action to Take When Disk Is Full</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>disk_full_action setting in /etc/audit/auditd.conf is set to a certain action</oval:description>
            <oval:reference ref_id="auditd_data_disk_full_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="disk_full_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_disk_full_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_action_mail_acct:def:1" version="2">
          <oval:metadata>
            <oval:title>Auditd Email Account to Notify Upon Action</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>action_mail_acct setting in /etc/audit/auditd.conf is set to a certain account</oval:description>
            <oval:reference ref_id="auditd_data_retention_action_mail_acct" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="action_mail_acct setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" version="2">
          <oval:metadata>
            <oval:title>Auditd Action to Take When Disk is Low on Space</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action</oval:description>
            <oval:reference ref_id="auditd_data_retention_admin_space_left_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="admin_space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file:def:1" version="2">
          <oval:metadata>
            <oval:title>Auditd Maximum Log File Size</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>max_log_file setting in /etc/audit/auditd.conf is set to at least a certain value</oval:description>
            <oval:reference ref_id="auditd_data_retention_max_log_file" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="max_log_file setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file_action:def:1" version="2">
          <oval:metadata>
            <oval:title>Auditd Action to Take When Maximum Log Size Reached</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>max_log_file_action setting in /etc/audit/auditd.conf is set to a certain action</oval:description>
            <oval:reference ref_id="auditd_data_retention_max_log_file_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="max_log_file_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_num_logs:def:1" version="2">
          <oval:metadata>
            <oval:title>Auditd Maximum Number of Logs to Retain</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>num_logs setting in /etc/audit/auditd.conf is set to at least a certain value</oval:description>
            <oval:reference ref_id="auditd_data_retention_num_logs" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="num_logs setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_num_logs:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_space_left:def:1" version="2">
          <oval:metadata>
            <oval:title>Configure auditd space_left on Low Disk Space</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>space_left setting in /etc/audit/auditd.conf is set to at least a certain value</oval:description>
            <oval:reference ref_id="auditd_data_retention_space_left" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="space_left setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_space_left:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_data_retention_space_left_action:def:1" version="3">
          <oval:metadata>
            <oval:title>Auditd Action to Take When Disk Starting to Run Low on Space</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>space_left_action setting in /etc/audit/auditd.conf is set to a certain action</oval:description>
            <oval:reference ref_id="auditd_data_retention_space_left_action" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_space_left_action:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-grub2_enable_iommu_force:def:1" version="1">
          <oval:metadata>
            <oval:title>Force IOMMU usage in GRUB2</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Look for argument iommu=force in the kernel line in /etc/default/grub.</oval:description>
            <oval:reference ref_id="grub2_enable_iommu_force" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="check for GRUB_CMDLINE_LINUX_DEFAULT exists in /etc/default/grub" definition_ref="oval:ssg-grub2_default_exists:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="check for iommu=force in /etc/default/grub via GRUB_CMDLINE_LINUX_DEFAULT" test_ref="oval:ssg-test_grub2_enable_force_iommu_default:tst:1"/>
              <oval:criterion comment="check for iommu=force in /etc/default/grub via GRUB_CMDLINE_LINUX" test_ref="oval:ssg-test_grub2_enable_force_iommu:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-grub2_password:def:1" version="1">
          <oval:metadata>
            <oval:title>Set Boot Loader Password</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The grub2 boot loader should have password protection enabled.</oval:description>
            <oval:reference ref_id="grub2_password" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Pass if /sys/firmware/efi exists" test_ref="oval:ssg-test_bootloader_uefi_used:tst:1"/>
            <oval:criterion comment="make sure a password is defined in /boot/grub2/grub.cfg" test_ref="oval:ssg-test_grub2_password_grubcfg:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-grub2_uefi_password:def:1" version="1">
          <oval:metadata>
            <oval:title>Set the UEFI Boot Loader Password</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The UEFI grub2 boot loader should have password protection enabled.</oval:description>
            <oval:reference ref_id="grub2_uefi_password" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Pass if /sys/firmware/efi does not exist" negate="true" test_ref="oval:ssg-test_bootloader_uefi_used:tst:1"/>
            <oval:criterion comment="make sure a password is defined in /boot/efi/EFI/sles/grub.cfg" test_ref="oval:ssg-test_grub2_uefi_password_grubcfg:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-ensure_rtc_utc_configuration:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure RTC is using UTC as its time base</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Time stamps generated by the operating system include date and time. Time is commonly expressed
	           in UTC, a modern continuation of GMT, or local time with an offset from UTC.</oval:description>
            <oval:reference ref_id="ensure_rtc_utc_configuration" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Check /etc/adjtime is set to UTC" test_ref="oval:ssg-test_ensure_rtc_utc_configuration:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-ensure_logrotate_activated:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure the logrotate utility performs the automatic rotation of log files on daily basis</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>
      The frequency of automatic log files rotation performed by the logrotate utility should be configured to run daily
      </oval:description>
            <oval:reference ref_id="ensure_logrotate_activated" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="/etc/logrotate.conf contains daily setting and /etc/cron.daily/logrotate file exists" operator="AND">
            <oval:criterion comment="Check if daily is set in /etc/logrotate.conf" test_ref="oval:ssg-test_logrotate_conf_daily_setting:tst:1"/>
            <oval:criterion comment="Check if /etc/cron.daily/logrotate file exists (and calls logrotate)" test_ref="oval:ssg-test_cron_daily_logrotate_existence:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-rsyslog_remote_loghost:def:1" version="1">
          <oval:metadata>
            <oval:title>Send Logs to a Remote Loghost</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Syslog logs should be sent to a remote loghost</oval:description>
            <oval:reference ref_id="rsyslog_remote_loghost" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Remote logging set within /etc/rsyslog.conf" test_ref="oval:ssg-test_remote_rsyslog_conf:tst:1"/>
            <oval:criterion comment="Remote logging set within /etc/rsyslog.d" test_ref="oval:ssg-test_remote_rsyslog_d:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-network_sniffer_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable the network sniffer</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Disable the network sniffer</oval:description>
            <oval:reference ref_id="network_sniffer_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="promisc interfaces" negate="true" test_ref="oval:ssg-test_promisc_interfaces:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_ipv6_option_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable IPv6 Kernel Module Functionality via Disable Option</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The disable option will allow the IPv6 module to be inserted, but prevent address assignment and activation of the network stack.</oval:description>
            <oval:reference ref_id="kernel_module_ipv6_option_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="ipv6 disabled any modprobe conf file" test_ref="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-wireless_disable_interfaces:def:1" version="1">
          <oval:metadata>
            <oval:title>Deactivate Wireless Interfaces</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All wireless interfaces should be disabled.</oval:description>
            <oval:reference ref_id="wireless_disable_interfaces" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="query /proc/net/wireless" test_ref="oval:ssg-test_wireless_disable_interfaces:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-susefirewall2_ddos_protection:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable DoS Protections in SuSEfirewall2</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Verify "SuSEfirewall2" is configured to protect the SUSE operating system against or limit the effects of DoS attacks.</oval:description>
            <oval:reference ref_id="susefirewall2_ddos_protection" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="SuSEfirewall2 is installed" definition_ref="oval:ssg-package_SuSEfirewall2_installed:def:1"/>
            <oval:extend_definition comment="SuSEfirewall2 is enabled" definition_ref="oval:ssg-service_SuSEfirewall2_enabled:def:1"/>
            <oval:criterion comment="DoS protection is configured" test_ref="oval:ssg-test_susefirewall2_ddos_protection:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify that All World-Writable Directories Have Sticky Bits Set</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sticky bit should be set for all world-writable directories.</oval:description>
            <oval:reference ref_id="dir_perms_world_writable_sticky_bits" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="all local world writable directories have sticky bit set" negate="true" test_ref="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_systemmap:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify that System.map files are readable only by root</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>
        Checks that /boot/System.map-* are only readable by root.
      </oval:description>
            <oval:reference ref_id="file_permissions_systemmap" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_permissions_systemmap_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_ungroupowned:def:1" version="2">
          <oval:metadata>
            <oval:title>Find files unowned by a group</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All files should be owned by a group</oval:description>
            <oval:reference ref_id="file_permissions_ungroupowned" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check all files and make sure they are owned by a group" test_ref="oval:ssg-test_file_permissions_ungroupowned:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-no_files_unowned_by_user:def:1" version="1">
          <oval:metadata>
            <oval:title>Find files unowned by a user</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All files should be owned by a user</oval:description>
            <oval:reference ref_id="no_files_unowned_by_user" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check all files and make sure they are owned by a user" negate="true" test_ref="oval:ssg-no_files_unowned_by_user_test:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dir_perms_world_writable_system_groupowned:def:1" version="1">
          <oval:metadata>
            <oval:title>Find world writable directories not group-owned by an application group</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>All world writable directories should be groupowned by an application group.</oval:description>
            <oval:reference ref_id="dir_perms_world_writable_system_groupowned" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="check for local directories that are world writable and have gid greater than or equal to 1000" negate="true">
            <oval:criterion comment="check for local directories that are world writable and have gid greater than or equal to 1000" test_ref="oval:ssg-test_dir_world_writable_gid_gt_value:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_etc_security_opasswd:def:1" version="2">
          <oval:metadata>
            <oval:title>Verify Permissions and Ownership of Old Passwords File</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Verify Permissions and Ownership of Old Passwords File</oval:description>
            <oval:reference ref_id="file_etc_security_opasswd" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="root should own /etc/security/opasswd">
            <oval:criterion test_ref="oval:ssg-test_file_etc_security_opasswd:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_nodev_nonroot_local_partitions:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nodev Option to Non-Root Local Partitions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nodev mount option prevents files from being interpreted
      as character or block devices. Legitimate character and block devices
      should exist in the /dev directory on the root partition or within chroot
      jails built for system services. All other locations should not allow
      character and block devices.</oval:description>
            <oval:reference ref_id="mount_option_nodev_nonroot_local_partitions" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nodev on local filesystems" negate="true" test_ref="oval:ssg-test_nodev_nonroot_local_partitions:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_var_tmp_bind:def:1" version="1">
          <oval:metadata>
            <oval:title>Bind Mount /var/tmp To /tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The /var/tmp directory should be bind mounted to /tmp in
      order to consolidate temporary storage into one location protected by the
      same techniques as /tmp.</oval:description>
            <oval:reference ref_id="mount_option_var_tmp_bind" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="Ensure /var/tmp is configured to bind mount to /tmp" test_ref="oval:ssg-test_configure_mount_option_var_tmp_bind_tmp:tst:1"/>
            <oval:criterion comment="Ensure /var/tmp is mounted" test_ref="oval:ssg-test_mount_option_var_tmp:tst:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="Ensure /var/tmp is mounted and binded" test_ref="oval:ssg-test_mount_option_var_tmp_bind:tst:1"/>
              <oval:criterion comment="Ensure /var/tmp and /tmp have the same source device" test_ref="oval:ssg-test_mount_option_var_tmp_bind_compare_source:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_nfs_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add 'nosuid' Option to NFS Mounts</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The 'nosuid' mount option can be used to prevent execution of setuid programs in network mounts.</oval:description>
            <oval:reference ref_id="mount_option_nfs_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for NFS mounts that currently are mounted without the nosuid option." test_ref="oval:ssg-test_nfs_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_nfs_noexec:def:1" version="1">
          <oval:metadata>
            <oval:title>Add 'noexec' Option to NFS Mounts</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The 'noexec' mount option can be used to prevent execution of setuid programs in network mounts.</oval:description>
            <oval:reference ref_id="mount_option_nfs_noexec" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for home directories of interactive users that currently do not have a home directory assigned." test_ref="oval:ssg-test_nfs_noexec:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_home_directories_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nosuid Option to /home</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nosuid mount option can be used to prevent execution of setuid programs in /home.</oval:description>
            <oval:reference ref_id="mount_home_directories_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for home directories of interactive users that currently do not have a home directory assigned." test_ref="oval:ssg-test_home_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_var_log_messages:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify that /var/log/messages is readable only by root</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>
          Checks that /var/log/messages is only readable by root.
      </oval:description>
            <oval:reference ref_id="file_permissions_var_log_messages" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_permissions_var_log_messages_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-partition_for_home_dirs:def:1" version="1">
          <oval:metadata>
            <oval:title>Partition for Home Directories Must Exist</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check for a separate partition for home directories of interactive users.</oval:description>
            <oval:reference ref_id="partition_for_home_dirs" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check for partition for home directories of interactive users that." test_ref="oval:ssg-test_partition_home_dirs:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-enable_dconf_user_profile:def:1" version="1">
          <oval:metadata>
            <oval:title>Implement Local DB for DConf User Profile</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The DConf User profile should have the local DB configured.</oval:description>
            <oval:reference ref_id="enable_dconf_user_profile" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="dconf installed" definition_ref="oval:ssg-package_dconf_installed:def:1" negate="true"/>
            <oval:criterion comment="dconf user profile exists" test_ref="oval:ssg-test_dconf_user_profile:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dconf_use_text_backend:def:1" version="1">
          <oval:metadata>
            <oval:title>Force dconf to use the textfiles instead of a binary DB</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>dconf should use text files instead of the binary database.</oval:description>
            <oval:reference ref_id="dconf_use_text_backend" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="dconf installed" definition_ref="oval:ssg-package_dconf_installed:def:1" negate="true"/>
            <oval:criterion comment="check the text backend config directive" test_ref="oval:ssg-test_dconf_backend_directive:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-gnome_gdm_disable_automatic_login:def:1" version="2">
          <oval:metadata>
            <oval:title>Disable GDM Automatic Login</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Disable the GNOME Display Manager (GDM) ability to allow users to
      automatically login.</oval:description>
            <oval:reference ref_id="gnome_gdm_disable_automatic_login" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true"/>
            <oval:criterion comment="Disable GDM Automatic Login" test_ref="oval:ssg-test_disable_automatic_login:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-dconf_gnome_disable_ctrlaltdel_reboot:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Disable the GNOME3 ctrl-alt-del reboot key sequence in GNOME3.</oval:description>
            <oval:reference ref_id="dconf_gnome_disable_ctrlaltdel_reboot" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="dconf installed" definition_ref="oval:ssg-package_dconf_installed:def:1" negate="true"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="dconf user profile exists" definition_ref="oval:ssg-enable_dconf_user_profile:def:1"/>
              <oval:criterion comment="Disable Ctrl-Alt-Del" test_ref="oval:ssg-test_disable_gnome_ctrlaltdel:tst:1"/>
              <oval:criterion comment="Prevent user from changing" test_ref="oval:ssg-test_prevent_user_enable_ctrlaltdel:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-installed_OS_is_FIPS_certified:def:1" version="1">
          <oval:metadata>
            <oval:title>FIPS 140-2 Certified Operating System</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>
          The operating system installed on the system is a certified operating system that meets FIPS 140-2 requirements.
      </oval:description>
            <oval:reference ref_id="installed_OS_is_FIPS_certified" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Installed operating system is a certified operating system" operator="OR">
            <oval:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1"/>
            <oval:extend_definition comment="Installed OS is RHEL7" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <oval:extend_definition comment="Installed OS is SLE12" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
            <oval:extend_definition comment="Installed OS is OL7" definition_ref="oval:ssg-installed_OS_is_ol7_family:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_antivirus:def:1" version="1">
          <oval:metadata>
            <oval:title>Package Antivirus Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Antivirus software should be installed.</oval:description>
            <oval:reference ref_id="install_antivirus" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Antivirus is not being used or conditions are met">
            <oval:extend_definition comment="McAfee A/V Installed" definition_ref="oval:ssg-install_mcafee_antivirus:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_antivirus:def:1" version="1">
          <oval:metadata>
            <oval:title>Package McAfeeVSEForLinux Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>McAfee Antivirus software should be installed.</oval:description>
            <oval:reference ref_id="install_mcafee_antivirus" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="Antivirus is not being used or conditions are met" operator="AND">
            <oval:extend_definition comment="McAfee Runtime Libraries and Agent" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1"/>
            <oval:criterion comment="Linuxshield AntiVirus package is installed" test_ref="oval:ssg-test_linuxshield_install_antivirus:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_cma_rt:def:1" version="1">
          <oval:metadata>
            <oval:title>Install the McAfee Runtime Libraries and Linux Agent</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Install the McAfee Runtime Libraries (MFErt) and Linux Agent (MFEcma).</oval:description>
            <oval:reference ref_id="install_mcafee_cma_rt" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="McAfee runtime library package installed" test_ref="oval:ssg-test_mcafee_runtime_installed:tst:1"/>
            <oval:criterion comment="McAfee management agent package installed" test_ref="oval:ssg-test_mcafee_management_agent:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mcafee_antivirus_definitions_updated:def:1" version="1">
          <oval:metadata>
            <oval:title>McAfee AntiVirus Definitions Updated</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Verify that McAfee AntiVirus definitions have been updated.</oval:description>
            <oval:reference ref_id="mcafee_antivirus_definitions_updated" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check if McAfee AntiVirus definitions have been updated" test_ref="oval:ssg-test_mcafee_antivirus_definitions_updated:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_hbss_accm:def:1" version="1">
          <oval:metadata>
            <oval:title>Install the Asset Configuration Compliance Module (ACCM)</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Install the Asset Configuration Compliance Module (ACCM).</oval:description>
            <oval:reference ref_id="install_mcafee_hbss_accm" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="McAfee ACCM is installed" test_ref="oval:ssg-test_mcafee_accm_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_hbss_hips:def:1" version="1">
          <oval:metadata>
            <oval:title>Install the Host Intrusion Prevention System (HIPS) Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Install the McAfee Host Intrusion Prevention System (HIPS) Module if it is
      absolutely necessary. If SELinux is enabled, do not install or enable this module.</oval:description>
            <oval:reference ref_id="install_mcafee_hbss_hips" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="McAfee IPS  is installed" test_ref="oval:ssg-test_mcafee_hbss_hips_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_hbss_pa:def:1" version="1">
          <oval:metadata>
            <oval:title>Install the Policy Auditor (PA) Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Install the Policy Auditor (PA) Module.</oval:description>
            <oval:reference ref_id="install_mcafee_hbss_pa" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="McAfee Policy Auditor is installed" test_ref="oval:ssg-test_mcafee_auditengine_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-enable_dracut_fips_module:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable Dracut FIPS Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>fips module should be enabled in Dracut configuration</oval:description>
            <oval:reference ref_id="enable_dracut_fips_module" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="dracut fips module is enabled" test_ref="oval:ssg-test_enable_dracut_fips_module:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-enable_fips_mode:def:1" version="1">
          <oval:metadata>
            <oval:title>Enable FIPS Mode</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check if FIPS mode is enabled on the system</oval:description>
            <oval:reference ref_id="enable_fips_mode" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="check sysctl crypto.fips_enabled = 1" definition_ref="oval:ssg-sysctl_crypto_fips_enabled:def:1"/>
            <oval:extend_definition comment="Dracut FIPS module is enabled" definition_ref="oval:ssg-enable_dracut_fips_module:def:1"/>
            <oval:extend_definition comment="Installed OS is FIPS certified" definition_ref="oval:ssg-installed_OS_is_FIPS_certified:def:1"/>
            <oval:criterion comment="check if system crypto policy selection in var_system_crypto_policy in the profile is set to FIPS" test_ref="oval:ssg-test_system_crypto_policy_value:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_crypto_fips_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Kernel "crypto.fips_enabled" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "crypto.fips_enabled" parameter should be set to "1" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_crypto_fips_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter crypto.fips_enabled set to 1" test_ref="oval:ssg-test_sysctl_crypto_fips_enabled:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-aide_periodic_cron_checking:def:1" version="3">
          <oval:metadata>
            <oval:title>Configure Periodic Execution of AIDE</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>By default, AIDE does not install itself for periodic
      execution. Periodically running AIDE is necessary to reveal
      unexpected changes in installed files.
      </oval:description>
            <oval:reference ref_id="aide_periodic_cron_checking" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="run aide with cron" test_ref="oval:ssg-test_aide_periodic_cron_checking:tst:1"/>
              <oval:criterion comment="run aide with cron" test_ref="oval:ssg-test_aide_crond_checking:tst:1"/>
              <oval:criterion comment="run aide with cron" test_ref="oval:ssg-test_aide_var_cron_checking:tst:1"/>
              <oval:criterion comment="run aide with cron.(daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_checking:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-aide_scan_notification:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure Notification of Post-AIDE Scan Details</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>AIDE should notify appropriate personnel of the details
      of a scan after the scan has been run.</oval:description>
            <oval:reference ref_id="aide_scan_notification" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_scan_notification:tst:1"/>
              <oval:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_var_cron_notification:tst:1"/>
              <oval:criterion comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_notification:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-aide_verify_acls:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure AIDE to Verify Access Control Lists (ACLs)</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>AIDE should be configured to verify Access Control Lists (ACLs).</oval:description>
            <oval:reference ref_id="aide_verify_acls" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
            <oval:criterion comment="acl is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_acls:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-aide_verify_ext_attributes:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure AIDE to Verify Extended Attributes</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>AIDE should be configured to verify extended file attributes.</oval:description>
            <oval:reference ref_id="aide_verify_ext_attributes" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
            <oval:criterion comment="xattrs is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_ext_attributes:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-aide_check_audit_tools:def:1" version="1">
          <oval:metadata>
            <oval:title>Configure AIDE to Verify the Audit Tools</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.</oval:description>
            <oval:reference ref_id="aide_check_audit_tools" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
            <oval:criterion comment="auditctl is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_auditctl:tst:1"/>
            <oval:criterion comment="auditd is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_auditd:tst:1"/>
            <oval:criterion comment="ausearch is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_ausearch:tst:1"/>
            <oval:criterion comment="aureport is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_aureport:tst:1"/>
            <oval:criterion comment="autrace is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_autrace:tst:1"/>
            <oval:criterion comment="audispd is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_audispd:tst:1"/>
            <oval:criterion comment="augenrules is checked in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_augenrules:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-accounts_authorized_local_users:def:1" version="1">
          <oval:metadata>
            <oval:title>Only Authorized Local User Accounts Exist on Operating System</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Besides the default operating system user, there should be no other users
      except the users that are authorized to exist locally on the operating system.</oval:description>
            <oval:reference ref_id="accounts_authorized_local_users" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="only root user and explicitly authorized users are allowed in /etc/passwd" test_ref="oval:ssg-test_accounts_authorized_local_users:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sudo_remove_no_authenticate:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure !authenticate Is Not Used in Sudo</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks sudo usage without authentication</oval:description>
            <oval:reference ref_id="sudo_remove_no_authenticate" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="!authenticate does not exist in /etc/sudoers" test_ref="oval:ssg-test_no_authenticate_etc_sudoers:tst:1"/>
            <oval:criterion comment="!authenticate does not exist in /etc/sudoers.d" test_ref="oval:ssg-test_no_authenticate_etc_sudoers_d:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sudo_remove_nopasswd:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure NOPASSWD Is Not Used in Sudo</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks sudo usage without password</oval:description>
            <oval:reference ref_id="sudo_remove_nopasswd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="NOPASSWD is not configured in /etc/sudoers" test_ref="oval:ssg-test_nopasswd_etc_sudoers:tst:1"/>
            <oval:criterion comment="NOPASSWD is not configured in /etc/sudoers.d" test_ref="oval:ssg-test_nopasswd_etc_sudoers_d:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-clean_components_post_updating:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Zypper Removes Previous Package Versions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The solver.upgradeRemoveDroppedPackages option should be used to ensure that old 
      versions of software components are removed after updating.</oval:description>
            <oval:reference ref_id="clean_components_post_updating" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="check value of solver.upgradeRemoveDroppedPackages in /etc/zypp/zypp.conf" test_ref="oval:ssg-test_zypp_clean_components_post_updating:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-ensure_gpgcheck_globally_activated:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure zypper gpgcheck Globally Activated</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The gpgcheck option should be used to ensure that checking
      of an RPM package's signature always occurs prior to its
      installation.</oval:description>
            <oval:reference ref_id="ensure_gpgcheck_globally_activated" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criteria operator="OR">
              <oval:criterion comment="check value of gpgcheck in /etc/zypp/zypp.conf" test_ref="oval:ssg-test_ensure_gpgcheck_globally_activated:tst:1"/>
              <oval:criterion comment="gpgcheck in /etc/zypp/zypp.conf not set" test_ref="oval:ssg-test_ensure_gpgcheck_globally_unset:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="OR">
              <oval:criterion comment="check value of repo_gpgcheck in /etc/zypp/zypp.conf" test_ref="oval:ssg-test_ensure_repo_gpgcheck_globally_activated:tst:1"/>
              <oval:criterion comment="repo_gpgcheck in /etc/zypp/zypp.conf not set" test_ref="oval:ssg-test_ensure_repo_gpgcheck_globally_unset:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="OR">
              <oval:criterion comment="check value of pkg_gpgcheck in /etc/zypp/zypp.conf" test_ref="oval:ssg-test_ensure_pkg_gpgcheck_globally_activated:tst:1"/>
              <oval:criterion comment="pkg_gpgcheck in /etc/zypp/zypp.conf not set" test_ref="oval:ssg-test_ensure_pkg_gpgcheck_globally_unset:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-blacklist_usb-storage:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable the usb-storage Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Make sure there is a blacklist entry for the usb-storage driver.</oval:description>
            <oval:reference ref_id="blacklist_usb-storage" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="check for blacklist of usb-storage in /etc/modprobe.d" test_ref="oval:ssg-test_blacklist_d_usb-storage:tst:1"/>
            <oval:criterion comment="check for blacklist of usb-storage in /etc/modprobe.conf" test_ref="oval:ssg-test_blacklist_f_usb-storage:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_mount:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - mount</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_mount" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit mount" test_ref="oval:ssg-test_32bit_ardm_mount_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit mount" test_ref="oval:ssg-test_64bit_ardm_mount_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit mount" test_ref="oval:ssg-test_32bit_ardm_mount_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit mount" test_ref="oval:ssg-test_64bit_ardm_mount_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_umount:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - umount</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_umount" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit umount" test_ref="oval:ssg-test_32bit_ardm_umount_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit umount" test_ref="oval:ssg-test_32bit_ardm_umount_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_umount2:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - umount2</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_umount2" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit umount2" test_ref="oval:ssg-test_32bit_ardm_umount2_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit umount2" test_ref="oval:ssg-test_64bit_ardm_umount2_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit umount2" test_ref="oval:ssg-test_32bit_ardm_umount2_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit umount2" test_ref="oval:ssg-test_64bit_ardm_umount2_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_chacl:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run chacl</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chacl is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_chacl" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chacl" test_ref="oval:ssg-test_audit_rules_execution_chacl_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chacl" test_ref="oval:ssg-test_audit_rules_execution_chacl_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chacl" test_ref="oval:ssg-test_audit_rules_execution_chacl_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chacl" test_ref="oval:ssg-test_audit_rules_execution_chacl_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_chcon:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run chcon</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chcon is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_chcon" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chcon" test_ref="oval:ssg-test_audit_rules_execution_chcon_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chcon" test_ref="oval:ssg-test_audit_rules_execution_chcon_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chcon" test_ref="oval:ssg-test_audit_rules_execution_chcon_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chcon" test_ref="oval:ssg-test_audit_rules_execution_chcon_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_chmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run chmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chmod is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_chmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chmod" test_ref="oval:ssg-test_audit_rules_execution_chmod_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chmod" test_ref="oval:ssg-test_audit_rules_execution_chmod_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chmod" test_ref="oval:ssg-test_audit_rules_execution_chmod_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chmod" test_ref="oval:ssg-test_audit_rules_execution_chmod_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_crontab:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run crontab</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of crontab is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_crontab" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules crontab" test_ref="oval:ssg-test_audit_rules_execution_crontab_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_execution_crontab_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_execution_crontab_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_execution_crontab_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_rm:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run rm</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of rm is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_rm" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules rm" test_ref="oval:ssg-test_audit_rules_execution_rm_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl rm" test_ref="oval:ssg-test_audit_rules_execution_rm_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl rm" test_ref="oval:ssg-test_audit_rules_execution_rm_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl rm" test_ref="oval:ssg-test_audit_rules_execution_rm_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_setfacl:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run setfacl</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of setfacl is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_setfacl" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules setfacl" test_ref="oval:ssg-test_audit_rules_execution_setfacl_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl setfacl" test_ref="oval:ssg-test_audit_rules_execution_setfacl_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl setfacl" test_ref="oval:ssg-test_audit_rules_execution_setfacl_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl setfacl" test_ref="oval:ssg-test_audit_rules_execution_setfacl_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_ssh-agent:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run ssh-agent</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of ssh-agent is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_ssh-agent" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules ssh-agent" test_ref="oval:ssg-test_audit_rules_execution_ssh-agent_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl ssh-agent" test_ref="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl ssh-agent" test_ref="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl ssh-agent" test_ref="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_login_events_faillog:def:1" version="2">
          <oval:metadata>
            <oval:title>Record Attempts to Alter Login and Logout Events - faillog</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</oval:description>
            <oval:reference ref_id="audit_rules_login_events_faillog" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules faillog" test_ref="oval:ssg-test_arle_faillog_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl faillog" test_ref="oval:ssg-test_arle_faillog_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_chage:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - chage</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chage is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_chage" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chage" test_ref="oval:ssg-test_audit_rules_privileged_commands_chage_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chage" test_ref="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chage" test_ref="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chage" test_ref="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_chfn:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - chfn</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chfn is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_chfn" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chfn" test_ref="oval:ssg-test_audit_rules_privileged_commands_chfn_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chfn" test_ref="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chfn" test_ref="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chfn" test_ref="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_chsh:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - chsh</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of chsh is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_chsh" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules chsh" test_ref="oval:ssg-test_audit_rules_privileged_commands_chsh_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl chsh" test_ref="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl chsh" test_ref="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl chsh" test_ref="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_gpasswd:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of gpasswd is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_gpasswd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules gpasswd" test_ref="oval:ssg-test_audit_rules_privileged_commands_gpasswd_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl gpasswd" test_ref="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl gpasswd" test_ref="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl gpasswd" test_ref="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_insmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - insmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of insmod is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_insmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules insmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_insmod_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl insmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl insmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl insmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_kmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - kmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of kmod is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_kmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules kmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_kmod_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl kmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl kmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl kmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_modprobe:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - modprobe</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of modprobe is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_modprobe" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules modprobe" test_ref="oval:ssg-test_audit_rules_privileged_commands_modprobe_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl modprobe" test_ref="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl modprobe" test_ref="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl modprobe" test_ref="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_newgrp:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - newgrp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of newgrp is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_newgrp" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules newgrp" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgrp_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl newgrp" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl newgrp" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl newgrp" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_pam_timestamp_check:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of pam_timestamp_check is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_pam_timestamp_check" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules pam_timestamp_check" test_ref="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl pam_timestamp_check" test_ref="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl pam_timestamp_check" test_ref="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl pam_timestamp_check" test_ref="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_passmass:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - passmass</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of passmass is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_passmass" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules passmass" test_ref="oval:ssg-test_audit_rules_privileged_commands_passmass_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl passmass" test_ref="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl passmass" test_ref="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl passmass" test_ref="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - passwd</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of passwd is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules passwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_passwd_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl passwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl passwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl passwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_rmmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - rmmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of rmmod is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_rmmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules rmmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_rmmod_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl rmmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl rmmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl rmmod" test_ref="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_ssh_keysign:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - ssh_keysign</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of ssh_keysign is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_ssh_keysign" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules ssh_keysign" test_ref="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl ssh_keysign" test_ref="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl ssh_keysign" test_ref="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl ssh_keysign" test_ref="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_su:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - su</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of su is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_su" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules su" test_ref="oval:ssg-test_audit_rules_privileged_commands_su_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl su" test_ref="oval:ssg-test_audit_rules_privileged_commands_su_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl su" test_ref="oval:ssg-test_audit_rules_privileged_commands_su_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl su" test_ref="oval:ssg-test_audit_rules_privileged_commands_su_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_sudo:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - sudo</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of sudo is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_sudo" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules sudo" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudo_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl sudo" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl sudo" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl sudo" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_sudoedit:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of sudoedit is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_sudoedit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules sudoedit" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudoedit_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl sudoedit" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl sudoedit" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl sudoedit" test_ref="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_unix_chkpwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of unix_chkpwd is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_unix_chkpwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules unix_chkpwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl unix_chkpwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl unix_chkpwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl unix_chkpwd" test_ref="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_usermod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - usermod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of usermod is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_usermod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules usermod" test_ref="oval:ssg-test_audit_rules_privileged_commands_usermod_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl usermod" test_ref="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl usermod" test_ref="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl usermod" test_ref="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_cron_allow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/cron.allow Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/cron.allow is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_cron_allow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /etc/cron.allow" test_ref="oval:ssg-test_file_groupowner_cron_allow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_etc_group:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/group Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/group is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_etc_group" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /etc/group" test_ref="oval:ssg-test_file_groupowner_etc_group:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_etc_gshadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/gshadow Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/gshadow is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_etc_gshadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /etc/gshadow" test_ref="oval:ssg-test_file_groupowner_etc_gshadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_etc_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/passwd Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/passwd is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_etc_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /etc/passwd" test_ref="oval:ssg-test_file_groupowner_etc_passwd:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_etc_shadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/shadow Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/shadow is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_etc_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /etc/shadow" test_ref="oval:ssg-test_file_groupowner_etc_shadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_groupowner_grub_conf:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /boot/grub/grub.conf Group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /boot/grub/grub.conf is group owned by 0.</oval:description>
            <oval:reference ref_id="file_groupowner_grub_conf" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file group ownership of /boot/grub/grub.conf" test_ref="oval:ssg-test_file_groupowner_grub_conf:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_cron_allow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/cron.allow Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/cron.allow is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_cron_allow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /etc/cron.allow" test_ref="oval:ssg-test_file_owner_cron_allow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_etc_group:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/group Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/group is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_etc_group" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /etc/group" test_ref="oval:ssg-test_file_owner_etc_group:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_etc_gshadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/gshadow Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/gshadow is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_etc_gshadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /etc/gshadow" test_ref="oval:ssg-test_file_owner_etc_gshadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_etc_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/passwd Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/passwd is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_etc_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /etc/passwd" test_ref="oval:ssg-test_file_owner_etc_passwd:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_etc_shadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/shadow Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/shadow is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_etc_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /etc/shadow" test_ref="oval:ssg-test_file_owner_etc_shadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_owner_grub_conf:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /boot/grub/grub.conf Owner</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /boot/grub/grub.conf is owned by 0.</oval:description>
            <oval:reference ref_id="file_owner_grub_conf" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file ownership of /boot/grub/grub.conf" test_ref="oval:ssg-test_file_owner_grub_conf:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_cron_allow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/cron.allow Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/cron.allow has mode 0644.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_cron_allow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/cron.allow" test_ref="oval:ssg-test_file_permissions_cron_allow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_etc_group:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/group Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/group has mode 0644.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_etc_group" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/group" test_ref="oval:ssg-test_file_permissions_etc_group:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_etc_gshadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/gshadow Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/gshadow has mode 0000.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_etc_gshadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/gshadow" test_ref="oval:ssg-test_file_permissions_etc_gshadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_etc_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/passwd Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/passwd has mode 0644.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_etc_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/passwd" test_ref="oval:ssg-test_file_permissions_etc_passwd:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_etc_shadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/shadow Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/shadow has mode 0000.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_etc_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/shadow" test_ref="oval:ssg-test_file_permissions_etc_shadow:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_grub_conf:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /boot/grub/grub.conf Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /boot/grub/grub.conf has mode 0600.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_grub_conf" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /boot/grub/grub.conf" test_ref="oval:ssg-test_file_permissions_grub_conf:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_httpd_server_conf_d_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/httpd/conf.d/^.*$ Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/httpd/conf.d/^.*$ has mode 0640.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_httpd_server_conf_d_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/httpd/conf.d/^.*$" test_ref="oval:ssg-test_file_permissions_httpd_server_conf_d_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_httpd_server_conf_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/httpd/conf/^.*$ Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/httpd/conf/^.*$ has mode 0640.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_httpd_server_conf_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/httpd/conf/^.*$" test_ref="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_https_server_modules_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/httpd/conf.modules.d/^.*$ Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/httpd/conf.modules.d/^.*$ has mode 0640.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_https_server_modules_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/httpd/conf.modules.d/^.*$" test_ref="oval:ssg-test_file_permissions_https_server_modules_files:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_sshd_private_key:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/ssh/^.*_key$ Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/ssh/^.*_key$ has mode 0600.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_sshd_private_key" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/ssh/^.*_key$" test_ref="oval:ssg-test_file_permissions_sshd_private_key:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-file_permissions_sshd_pub_key:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify /etc/ssh/^.*.pub$ Mode Permissions</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>This test makes sure that /etc/ssh/^.*.pub$ has mode 0644.
      If the target file or directory has an extended ACL, then it will fail the mode check.
      </oval:description>
            <oval:reference ref_id="file_permissions_sshd_pub_key" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check file mode of /etc/ssh/^.*.pub$" test_ref="oval:ssg-test_file_permissions_sshd_pub_key:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_bluetooth_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable bluetooth Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module bluetooth should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_bluetooth_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module bluetooth disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_bluetooth_disabled:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_bluetooth_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_bluetooth_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_bluetooth_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_bluetooth_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module bluetooth disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_bluetooth_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_cramfs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable cramfs Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module cramfs should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_cramfs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module cramfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_cramfs_disabled:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_cramfs_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_cramfs_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_cramfs_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_cramfs_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module cramfs disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_cramfs_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_dccp_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable dccp Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module dccp should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_dccp_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module dccp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_dccp_disabled:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_dccp_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_dccp_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_dccp_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_dccp_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module dccp disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_dccp_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_freevxfs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable freevxfs Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module freevxfs should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_freevxfs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module freevxfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_freevxfs_disabled:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_freevxfs_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_freevxfs_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_freevxfs_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_freevxfs_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module freevxfs disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_freevxfs_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_hfs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable hfs Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module hfs should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_hfs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module hfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfs_disabled:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_hfs_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_hfs_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_hfs_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_hfs_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module hfs disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_hfs_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_hfsplus_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable hfsplus Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module hfsplus should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_hfsplus_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module hfsplus disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfsplus_disabled:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_hfsplus_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_hfsplus_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_hfsplus_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_hfsplus_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module hfsplus disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_hfsplus_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_jffs2_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable jffs2 Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module jffs2 should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_jffs2_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module jffs2 disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_jffs2_disabled:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_jffs2_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_jffs2_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_jffs2_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_jffs2_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module jffs2 disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_jffs2_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_sctp_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable sctp Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module sctp should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_sctp_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module sctp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_sctp_disabled:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_sctp_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_sctp_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_sctp_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_sctp_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module sctp disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_sctp_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_squashfs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable squashfs Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module squashfs should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_squashfs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module squashfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_squashfs_disabled:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_squashfs_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_squashfs_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_squashfs_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_squashfs_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module squashfs disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_squashfs_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_udf_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable udf Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module udf should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_udf_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module udf disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_udf_disabled:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_udf_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_udf_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_udf_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_udf_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_udf_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module udf disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_udf_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-kernel_module_usb-storage_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Disable usb-storage Kernel Module</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel module usb-storage should be disabled.</oval:description>
            <oval:reference ref_id="kernel_module_usb-storage_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel module usb-storage disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_usb-storage_disabled:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /etc/modules-load.d" test_ref="oval:ssg-test_kernmod_usb-storage_etcmodules-load:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /run/modules-load.d" test_ref="oval:ssg-test_kernmod_usb-storage_runmodules-load:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /usr/lib/modules-load.d" test_ref="oval:ssg-test_kernmod_usb-storage_libmodules-load:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /run/modprobe.d" test_ref="oval:ssg-test_kernmod_usb-storage_runmodprobed:tst:1"/>
            <oval:criterion comment="kernel module usb-storage disabled in /usr/lib/modprobe.d" test_ref="oval:ssg-test_kernmod_usb-storage_libmodprobed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nodev:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nodev Option to /dev/shm</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/dev/shm should be mounted with mount option nodev.</oval:description>
            <oval:reference ref_id="mount_option_dev_shm_nodev" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nodev on /dev/shm" test_ref="oval:ssg-test_dev_shm_partition_nodev:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_dev_shm_noexec:def:1" version="1">
          <oval:metadata>
            <oval:title>Add noexec Option to /dev/shm</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/dev/shm should be mounted with mount option noexec.</oval:description>
            <oval:reference ref_id="mount_option_dev_shm_noexec" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="noexec on /dev/shm" test_ref="oval:ssg-test_dev_shm_partition_noexec:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nosuid Option to /dev/shm</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/dev/shm should be mounted with mount option nosuid.</oval:description>
            <oval:reference ref_id="mount_option_dev_shm_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nosuid on /dev/shm" test_ref="oval:ssg-test_dev_shm_partition_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_home_nodev:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nodev Option to /home</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/home should be mounted with mount option nodev.</oval:description>
            <oval:reference ref_id="mount_option_home_nodev" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nodev on /home" test_ref="oval:ssg-test_home_partition_nodev:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_home_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nosuid Option to /home</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/home should be mounted with mount option nosuid.</oval:description>
            <oval:reference ref_id="mount_option_home_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nosuid on /home" test_ref="oval:ssg-test_home_partition_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_tmp_nodev:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nodev Option to /tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/tmp should be mounted with mount option nodev.</oval:description>
            <oval:reference ref_id="mount_option_tmp_nodev" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nodev on /tmp" test_ref="oval:ssg-test_tmp_partition_nodev:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_tmp_noexec:def:1" version="1">
          <oval:metadata>
            <oval:title>Add noexec Option to /tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/tmp should be mounted with mount option noexec.</oval:description>
            <oval:reference ref_id="mount_option_tmp_noexec" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="noexec on /tmp" test_ref="oval:ssg-test_tmp_partition_noexec:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_tmp_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nosuid Option to /tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/tmp should be mounted with mount option nosuid.</oval:description>
            <oval:reference ref_id="mount_option_tmp_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nosuid on /tmp" test_ref="oval:ssg-test_tmp_partition_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_var_tmp_nodev:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nodev Option to /var/tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/var/tmp should be mounted with mount option nodev.</oval:description>
            <oval:reference ref_id="mount_option_var_tmp_nodev" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nodev on /var/tmp" test_ref="oval:ssg-test_var_tmp_partition_nodev:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_var_tmp_noexec:def:1" version="1">
          <oval:metadata>
            <oval:title>Add noexec Option to /var/tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/var/tmp should be mounted with mount option noexec.</oval:description>
            <oval:reference ref_id="mount_option_var_tmp_noexec" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="noexec on /var/tmp" test_ref="oval:ssg-test_var_tmp_partition_noexec:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_var_tmp_nosuid:def:1" version="1">
          <oval:metadata>
            <oval:title>Add nosuid Option to /var/tmp</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>/var/tmp should be mounted with mount option nosuid.</oval:description>
            <oval:reference ref_id="mount_option_var_tmp_nosuid" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="nosuid on /var/tmp" test_ref="oval:ssg-test_var_tmp_partition_nosuid:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_SuSEfirewall2_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package SuSEfirewall2 Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package SuSEfirewall2 should be installed.</oval:description>
            <oval:reference ref_id="package_SuSEfirewall2_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package SuSEfirewall2 is installed" test_ref="oval:ssg-test_package_SuSEfirewall2_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_abrt_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package abrt Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package abrt should be removed.</oval:description>
            <oval:reference ref_id="package_abrt_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package abrt is removed" test_ref="oval:ssg-test_package_abrt_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_acpid_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package acpid Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package acpid should be removed.</oval:description>
            <oval:reference ref_id="package_acpid_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package acpid is removed" test_ref="oval:ssg-test_package_acpid_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_aide_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package aide Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package aide should be installed.</oval:description>
            <oval:reference ref_id="package_aide_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package aide is installed" test_ref="oval:ssg-test_package_aide_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_apparmor-parser_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package apparmor-parser Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package apparmor-parser should be installed.</oval:description>
            <oval:reference ref_id="package_apparmor-parser_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package apparmor-parser is installed" test_ref="oval:ssg-test_package_apparmor-parser_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_at_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package at Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package at should be removed.</oval:description>
            <oval:reference ref_id="package_at_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package at is removed" test_ref="oval:ssg-test_package_at_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_audit-audispd-plugins_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package audit-audispd-plugins Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package audit-audispd-plugins should be installed.</oval:description>
            <oval:reference ref_id="package_audit-audispd-plugins_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package audit-audispd-plugins is installed" test_ref="oval:ssg-test_package_audit-audispd-plugins_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_audit_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package audit Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package audit should be installed.</oval:description>
            <oval:reference ref_id="package_audit_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package audit is installed" test_ref="oval:ssg-test_package_audit_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_autofs_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package autofs Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package autofs should be removed.</oval:description>
            <oval:reference ref_id="package_autofs_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package autofs is removed" test_ref="oval:ssg-test_package_autofs_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_avahi_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package avahi Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package avahi should be removed.</oval:description>
            <oval:reference ref_id="package_avahi_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package avahi is removed" test_ref="oval:ssg-test_package_avahi_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_bind_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package bind Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package bind should be removed.</oval:description>
            <oval:reference ref_id="package_bind_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package bind is removed" test_ref="oval:ssg-test_package_bind_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_bluez_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package bluez Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package bluez should be removed.</oval:description>
            <oval:reference ref_id="package_bluez_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package bluez is removed" test_ref="oval:ssg-test_package_bluez_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_certmonger_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package certmonger Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package certmonger should be removed.</oval:description>
            <oval:reference ref_id="package_certmonger_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package certmonger is removed" test_ref="oval:ssg-test_package_certmonger_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_chrony_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package chrony Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package chrony should be installed.</oval:description>
            <oval:reference ref_id="package_chrony_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package chrony is installed" test_ref="oval:ssg-test_package_chrony_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_coolkey_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package coolkey Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package coolkey should be installed.</oval:description>
            <oval:reference ref_id="package_coolkey_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package coolkey is installed" test_ref="oval:ssg-test_package_coolkey_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_cronie_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package cronie Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package cronie should be installed.</oval:description>
            <oval:reference ref_id="package_cronie_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package cronie is installed" test_ref="oval:ssg-test_package_cronie_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_cups_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package cups Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package cups should be removed.</oval:description>
            <oval:reference ref_id="package_cups_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package cups is removed" test_ref="oval:ssg-test_package_cups_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_cyrus-sasl_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package cyrus-sasl Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package cyrus-sasl should be removed.</oval:description>
            <oval:reference ref_id="package_cyrus-sasl_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package cyrus-sasl is removed" test_ref="oval:ssg-test_package_cyrus-sasl_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_dbus_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package dbus Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package dbus should be removed.</oval:description>
            <oval:reference ref_id="package_dbus_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package dbus is removed" test_ref="oval:ssg-test_package_dbus_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_dconf_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package dconf Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package dconf should be installed.</oval:description>
            <oval:reference ref_id="package_dconf_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package dconf is installed" test_ref="oval:ssg-test_package_dconf_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_dhcp_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package dhcp Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package dhcp should be removed.</oval:description>
            <oval:reference ref_id="package_dhcp_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package dhcp is removed" test_ref="oval:ssg-test_package_dhcp_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_docker_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package docker Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package docker should be installed.</oval:description>
            <oval:reference ref_id="package_docker_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package docker is installed" test_ref="oval:ssg-test_package_docker_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_dovecot_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package dovecot Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package dovecot should be removed.</oval:description>
            <oval:reference ref_id="package_dovecot_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package dovecot is removed" test_ref="oval:ssg-test_package_dovecot_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_esc_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package esc Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package esc should be installed.</oval:description>
            <oval:reference ref_id="package_esc_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package esc is installed" test_ref="oval:ssg-test_package_esc_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_firewalld_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package firewalld Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package firewalld should be installed.</oval:description>
            <oval:reference ref_id="package_firewalld_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package firewalld is installed" test_ref="oval:ssg-test_package_firewalld_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_gdm_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package gdm Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package gdm should be installed.</oval:description>
            <oval:reference ref_id="package_gdm_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package gdm is installed" test_ref="oval:ssg-test_package_gdm_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_httpd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package httpd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package httpd should be removed.</oval:description>
            <oval:reference ref_id="package_httpd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package httpd is removed" test_ref="oval:ssg-test_package_httpd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_iputils_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package iputils Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package iputils should be removed.</oval:description>
            <oval:reference ref_id="package_iputils_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package iputils is removed" test_ref="oval:ssg-test_package_iputils_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_irqbalance_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package irqbalance Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package irqbalance should be installed.</oval:description>
            <oval:reference ref_id="package_irqbalance_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package irqbalance is installed" test_ref="oval:ssg-test_package_irqbalance_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_kbd_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package kbd Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package kbd should be installed.</oval:description>
            <oval:reference ref_id="package_kbd_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package kbd is installed" test_ref="oval:ssg-test_package_kbd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_kernel-tools_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package kernel-tools Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package kernel-tools should be removed.</oval:description>
            <oval:reference ref_id="package_kernel-tools_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package kernel-tools is removed" test_ref="oval:ssg-test_package_kernel-tools_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_kexec-tools_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package kexec-tools Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package kexec-tools should be removed.</oval:description>
            <oval:reference ref_id="package_kexec-tools_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package kexec-tools is removed" test_ref="oval:ssg-test_package_kexec-tools_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_libcgroup-tools_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package libcgroup-tools Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package libcgroup-tools should be removed.</oval:description>
            <oval:reference ref_id="package_libcgroup-tools_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package libcgroup-tools is removed" test_ref="oval:ssg-test_package_libcgroup-tools_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_libcgroup_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package libcgroup Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package libcgroup should be removed.</oval:description>
            <oval:reference ref_id="package_libcgroup_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package libcgroup is removed" test_ref="oval:ssg-test_package_libcgroup_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_libreswan_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package libreswan Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package libreswan should be installed.</oval:description>
            <oval:reference ref_id="package_libreswan_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package libreswan is installed" test_ref="oval:ssg-test_package_libreswan_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_mdadm_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package mdadm Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package mdadm should be removed.</oval:description>
            <oval:reference ref_id="package_mdadm_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package mdadm is removed" test_ref="oval:ssg-test_package_mdadm_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_mozilla-nss-tools_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package mozilla-nss-tools Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package mozilla-nss-tools should be installed.</oval:description>
            <oval:reference ref_id="package_mozilla-nss-tools_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package mozilla-nss-tools is installed" test_ref="oval:ssg-test_package_mozilla-nss-tools_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_mozilla-nss_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package mozilla-nss Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package mozilla-nss should be installed.</oval:description>
            <oval:reference ref_id="package_mozilla-nss_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package mozilla-nss is installed" test_ref="oval:ssg-test_package_mozilla-nss_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_net-snmp_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package net-snmp Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package net-snmp should be removed.</oval:description>
            <oval:reference ref_id="package_net-snmp_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package net-snmp is removed" test_ref="oval:ssg-test_package_net-snmp_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_nfs-utils_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package nfs-utils Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package nfs-utils should be removed.</oval:description>
            <oval:reference ref_id="package_nfs-utils_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package nfs-utils is removed" test_ref="oval:ssg-test_package_nfs-utils_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_ntp_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package ntp Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package ntp should be installed.</oval:description>
            <oval:reference ref_id="package_ntp_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package ntp is installed" test_ref="oval:ssg-test_package_ntp_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_ntp_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package ntp Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package ntp should be removed.</oval:description>
            <oval:reference ref_id="package_ntp_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package ntp is removed" test_ref="oval:ssg-test_package_ntp_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_ntpdate_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package ntpdate Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package ntpdate should be removed.</oval:description>
            <oval:reference ref_id="package_ntpdate_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package ntpdate is removed" test_ref="oval:ssg-test_package_ntpdate_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_oddjob_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package oddjob Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package oddjob should be removed.</oval:description>
            <oval:reference ref_id="package_oddjob_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package oddjob is removed" test_ref="oval:ssg-test_package_oddjob_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_opensc_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package opensc Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package opensc should be installed.</oval:description>
            <oval:reference ref_id="package_opensc_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package opensc is installed" test_ref="oval:ssg-test_package_opensc_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_openssh_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package openssh Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package openssh should be installed.</oval:description>
            <oval:reference ref_id="package_openssh_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package openssh is installed" test_ref="oval:ssg-test_package_openssh_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_openssh_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package openssh Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package openssh should be removed.</oval:description>
            <oval:reference ref_id="package_openssh_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package openssh is removed" test_ref="oval:ssg-test_package_openssh_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_pam_apparmor_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pam_apparmor Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package pam_apparmor should be installed.</oval:description>
            <oval:reference ref_id="package_pam_apparmor_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package pam_apparmor is installed" test_ref="oval:ssg-test_package_pam_apparmor_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_pam_pkcs11_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pam_pkcs11 Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package pam_pkcs11 should be installed.</oval:description>
            <oval:reference ref_id="package_pam_pkcs11_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package pam_pkcs11 is installed" test_ref="oval:ssg-test_package_pam_pkcs11_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_pcsc-ccid_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pcsc-ccid Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package pcsc-ccid should be installed.</oval:description>
            <oval:reference ref_id="package_pcsc-ccid_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package pcsc-ccid is installed" test_ref="oval:ssg-test_package_pcsc-ccid_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_pcsc-lite_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pcsc-lite Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package pcsc-lite should be installed.</oval:description>
            <oval:reference ref_id="package_pcsc-lite_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package pcsc-lite is installed" test_ref="oval:ssg-test_package_pcsc-lite_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_pcsc-tools_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pcsc-tools Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package pcsc-tools should be installed.</oval:description>
            <oval:reference ref_id="package_pcsc-tools_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package pcsc-tools is installed" test_ref="oval:ssg-test_package_pcsc-tools_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_policycoreutils_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package policycoreutils Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package policycoreutils should be installed.</oval:description>
            <oval:reference ref_id="package_policycoreutils_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package policycoreutils is installed" test_ref="oval:ssg-test_package_policycoreutils_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_portreserve_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package portreserve Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package portreserve should be removed.</oval:description>
            <oval:reference ref_id="package_portreserve_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package portreserve is removed" test_ref="oval:ssg-test_package_portreserve_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_postfix_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package postfix Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package postfix should be installed.</oval:description>
            <oval:reference ref_id="package_postfix_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package postfix is installed" test_ref="oval:ssg-test_package_postfix_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_psacct_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package psacct Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package psacct should be installed.</oval:description>
            <oval:reference ref_id="package_psacct_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package psacct is installed" test_ref="oval:ssg-test_package_psacct_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_qpid-cpp-server_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package qpid-cpp-server Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package qpid-cpp-server should be removed.</oval:description>
            <oval:reference ref_id="package_qpid-cpp-server_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package qpid-cpp-server is removed" test_ref="oval:ssg-test_package_qpid-cpp-server_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_quagga_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package quagga Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package quagga should be removed.</oval:description>
            <oval:reference ref_id="package_quagga_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package quagga is removed" test_ref="oval:ssg-test_package_quagga_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_quota-nld_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package quota-nld Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package quota-nld should be removed.</oval:description>
            <oval:reference ref_id="package_quota-nld_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package quota-nld is removed" test_ref="oval:ssg-test_package_quota-nld_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_rhnsd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package rhnsd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package rhnsd should be removed.</oval:description>
            <oval:reference ref_id="package_rhnsd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package rhnsd is removed" test_ref="oval:ssg-test_package_rhnsd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_rsh-server_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package rsh-server Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package rsh-server should be removed.</oval:description>
            <oval:reference ref_id="package_rsh-server_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package rsh-server is removed" test_ref="oval:ssg-test_package_rsh-server_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_rsh_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package rsh Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package rsh should be removed.</oval:description>
            <oval:reference ref_id="package_rsh_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package rsh is removed" test_ref="oval:ssg-test_package_rsh_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_rsyslog_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package rsyslog Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package rsyslog should be installed.</oval:description>
            <oval:reference ref_id="package_rsyslog_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package rsyslog is installed" test_ref="oval:ssg-test_package_rsyslog_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_samba_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package samba Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package samba should be removed.</oval:description>
            <oval:reference ref_id="package_samba_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package samba is removed" test_ref="oval:ssg-test_package_samba_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_screen_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package screen Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package screen should be installed.</oval:description>
            <oval:reference ref_id="package_screen_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package screen is installed" test_ref="oval:ssg-test_package_screen_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_smartmontools_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package smartmontools Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package smartmontools should be removed.</oval:description>
            <oval:reference ref_id="package_smartmontools_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package smartmontools is removed" test_ref="oval:ssg-test_package_smartmontools_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_squid_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package squid Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package squid should be removed.</oval:description>
            <oval:reference ref_id="package_squid_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package squid is removed" test_ref="oval:ssg-test_package_squid_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_sssd_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package sssd Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package sssd should be installed.</oval:description>
            <oval:reference ref_id="package_sssd_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package sssd is installed" test_ref="oval:ssg-test_package_sssd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_sssd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package sssd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package sssd should be removed.</oval:description>
            <oval:reference ref_id="package_sssd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package sssd is removed" test_ref="oval:ssg-test_package_sssd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_subscription-manager_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package subscription-manager Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package subscription-manager should be removed.</oval:description>
            <oval:reference ref_id="package_subscription-manager_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package subscription-manager is removed" test_ref="oval:ssg-test_package_subscription-manager_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_sysstat_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package sysstat Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package sysstat should be removed.</oval:description>
            <oval:reference ref_id="package_sysstat_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package sysstat is removed" test_ref="oval:ssg-test_package_sysstat_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_systemd_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package systemd Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package systemd should be installed.</oval:description>
            <oval:reference ref_id="package_systemd_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package systemd is installed" test_ref="oval:ssg-test_package_systemd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_systemd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package systemd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package systemd should be removed.</oval:description>
            <oval:reference ref_id="package_systemd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package systemd is removed" test_ref="oval:ssg-test_package_systemd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_talk-server_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package talk-server Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package talk-server should be removed.</oval:description>
            <oval:reference ref_id="package_talk-server_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package talk-server is removed" test_ref="oval:ssg-test_package_talk-server_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_talk_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package talk Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package talk should be removed.</oval:description>
            <oval:reference ref_id="package_talk_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package talk is removed" test_ref="oval:ssg-test_package_talk_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_tcp_wrappers_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package tcp_wrappers Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package tcp_wrappers should be installed.</oval:description>
            <oval:reference ref_id="package_tcp_wrappers_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package tcp_wrappers is installed" test_ref="oval:ssg-test_package_tcp_wrappers_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_telnet-server_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package telnet-server Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package telnet-server should be removed.</oval:description>
            <oval:reference ref_id="package_telnet-server_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package telnet-server is removed" test_ref="oval:ssg-test_package_telnet-server_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_telnet_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package telnet Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package telnet should be removed.</oval:description>
            <oval:reference ref_id="package_telnet_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package telnet is removed" test_ref="oval:ssg-test_package_telnet_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_tftp-server_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package tftp-server Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package tftp-server should be removed.</oval:description>
            <oval:reference ref_id="package_tftp-server_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package tftp-server is removed" test_ref="oval:ssg-test_package_tftp-server_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_tftp_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package tftp Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package tftp should be removed.</oval:description>
            <oval:reference ref_id="package_tftp_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package tftp is removed" test_ref="oval:ssg-test_package_tftp_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_vlock_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package vlock Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package vlock should be installed.</oval:description>
            <oval:reference ref_id="package_vlock_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package vlock is installed" test_ref="oval:ssg-test_package_vlock_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_vsftpd_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package vsftpd Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package vsftpd should be installed.</oval:description>
            <oval:reference ref_id="package_vsftpd_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package vsftpd is installed" test_ref="oval:ssg-test_package_vsftpd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_vsftpd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package vsftpd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package vsftpd should be removed.</oval:description>
            <oval:reference ref_id="package_vsftpd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package vsftpd is removed" test_ref="oval:ssg-test_package_vsftpd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_xinetd_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package xinetd Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package xinetd should be installed.</oval:description>
            <oval:reference ref_id="package_xinetd_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package xinetd is installed" test_ref="oval:ssg-test_package_xinetd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_xinetd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package xinetd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package xinetd should be removed.</oval:description>
            <oval:reference ref_id="package_xinetd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package xinetd is removed" test_ref="oval:ssg-test_package_xinetd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_ypbind_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package ypbind Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package ypbind should be removed.</oval:description>
            <oval:reference ref_id="package_ypbind_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package ypbind is removed" test_ref="oval:ssg-test_package_ypbind_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_ypserv_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package ypserv Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package ypserv should be removed.</oval:description>
            <oval:reference ref_id="package_ypserv_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package ypserv is removed" test_ref="oval:ssg-test_package_ypserv_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-partition_for_var:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure /var Located On Separate Partition</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>If stored locally, create a separate partition for
      /var. If /var will be mounted from another
      system such as an NFS server, then creating a separate partition is not
      necessary at this time, and the mountpoint can instead be configured
      later.</oval:description>
            <oval:reference ref_id="partition_for_var" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="/var on own partition" test_ref="oval:ssg-test_var_partition:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-partition_for_var_log_audit:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure /var/log/audit Located On Separate Partition</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>If stored locally, create a separate partition for
      /var/log/audit. If /var/log/audit will be mounted from another
      system such as an NFS server, then creating a separate partition is not
      necessary at this time, and the mountpoint can instead be configured
      later.</oval:description>
            <oval:reference ref_id="partition_for_var_log_audit" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="/var/log/audit on own partition" test_ref="oval:ssg-test_var_log_audit_partition:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_cron_allow:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/cron.allow</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/cron.allow.</oval:description>
            <oval:reference ref_id="permissions_cron_allow" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /etc/cron.allow" definition_ref="oval:ssg-file_groupowner_cron_allow:def:1"/>
            <oval:extend_definition comment="Check file ownership of /etc/cron.allow" definition_ref="oval:ssg-file_owner_cron_allow:def:1"/>
            <oval:extend_definition comment="Check file mode of /etc/cron.allow" definition_ref="oval:ssg-file_permissions_cron_allow:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_etc_group:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/group</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/group.</oval:description>
            <oval:reference ref_id="permissions_etc_group" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /etc/group" definition_ref="oval:ssg-file_groupowner_etc_group:def:1"/>
            <oval:extend_definition comment="Check file ownership of /etc/group" definition_ref="oval:ssg-file_owner_etc_group:def:1"/>
            <oval:extend_definition comment="Check file mode of /etc/group" definition_ref="oval:ssg-file_permissions_etc_group:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_etc_gshadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/gshadow</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/gshadow.</oval:description>
            <oval:reference ref_id="permissions_etc_gshadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /etc/gshadow" definition_ref="oval:ssg-file_groupowner_etc_gshadow:def:1"/>
            <oval:extend_definition comment="Check file ownership of /etc/gshadow" definition_ref="oval:ssg-file_owner_etc_gshadow:def:1"/>
            <oval:extend_definition comment="Check file mode of /etc/gshadow" definition_ref="oval:ssg-file_permissions_etc_gshadow:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_etc_passwd:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/passwd</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/passwd.</oval:description>
            <oval:reference ref_id="permissions_etc_passwd" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /etc/passwd" definition_ref="oval:ssg-file_groupowner_etc_passwd:def:1"/>
            <oval:extend_definition comment="Check file ownership of /etc/passwd" definition_ref="oval:ssg-file_owner_etc_passwd:def:1"/>
            <oval:extend_definition comment="Check file mode of /etc/passwd" definition_ref="oval:ssg-file_permissions_etc_passwd:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_etc_shadow:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/shadow</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/shadow.</oval:description>
            <oval:reference ref_id="permissions_etc_shadow" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /etc/shadow" definition_ref="oval:ssg-file_groupowner_etc_shadow:def:1"/>
            <oval:extend_definition comment="Check file ownership of /etc/shadow" definition_ref="oval:ssg-file_owner_etc_shadow:def:1"/>
            <oval:extend_definition comment="Check file mode of /etc/shadow" definition_ref="oval:ssg-file_permissions_etc_shadow:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_grub_conf:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /boot/grub/grub.conf</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /boot/grub/grub.conf.</oval:description>
            <oval:reference ref_id="permissions_grub_conf" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file group ownership of /boot/grub/grub.conf" definition_ref="oval:ssg-file_groupowner_grub_conf:def:1"/>
            <oval:extend_definition comment="Check file ownership of /boot/grub/grub.conf" definition_ref="oval:ssg-file_owner_grub_conf:def:1"/>
            <oval:extend_definition comment="Check file mode of /boot/grub/grub.conf" definition_ref="oval:ssg-file_permissions_grub_conf:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_httpd_server_conf_d_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/httpd/conf.d/^.*$</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/httpd/conf.d/^.*$.</oval:description>
            <oval:reference ref_id="permissions_httpd_server_conf_d_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file mode of /etc/httpd/conf.d/^.*$" definition_ref="oval:ssg-file_permissions_httpd_server_conf_d_files:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_httpd_server_conf_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/httpd/conf/^.*$</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/httpd/conf/^.*$.</oval:description>
            <oval:reference ref_id="permissions_httpd_server_conf_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file mode of /etc/httpd/conf/^.*$" definition_ref="oval:ssg-file_permissions_httpd_server_conf_files:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_https_server_modules_files:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/httpd/conf.modules.d/^.*$</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/httpd/conf.modules.d/^.*$.</oval:description>
            <oval:reference ref_id="permissions_https_server_modules_files" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file mode of /etc/httpd/conf.modules.d/^.*$" definition_ref="oval:ssg-file_permissions_https_server_modules_files:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_sshd_private_key:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/ssh/^.*_key$</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/ssh/^.*_key$.</oval:description>
            <oval:reference ref_id="permissions_sshd_private_key" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file mode of /etc/ssh/^.*_key$" definition_ref="oval:ssg-file_permissions_sshd_private_key:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-permissions_sshd_pub_key:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure Correct Mode, Owner, Group Owner for /etc/ssh/^.*.pub$</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks for correct UNIX permissions on /etc/ssh/^.*.pub$.</oval:description>
            <oval:reference ref_id="permissions_sshd_pub_key" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Check file mode of /etc/ssh/^.*.pub$" definition_ref="oval:ssg-file_permissions_sshd_pub_key:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_SuSEfirewall2_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service SuSEfirewall2 Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The SuSEfirewall2 service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_SuSEfirewall2_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package SuSEfirewall2 installed and service SuSEfirewall2 is configured to start" operator="AND">
            <oval:extend_definition comment="SuSEfirewall2 installed" definition_ref="oval:ssg-package_SuSEfirewall2_installed:def:1"/>
            <oval:criteria comment="service SuSEfirewall2 is configured to start and is running" operator="AND">
              <oval:criterion comment="SuSEfirewall2 is running" test_ref="oval:ssg-test_service_running_SuSEfirewall2:tst:1"/>
              <oval:criteria comment="service SuSEfirewall2 is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants SuSEfirewall2" test_ref="oval:ssg-test_multi_user_wants_SuSEfirewall2:tst:1"/>
                <oval:criterion comment="multi-user.target wants SuSEfirewall2 socket" test_ref="oval:ssg-test_multi_user_wants_SuSEfirewall2_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_abrtd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service abrtd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The abrtd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_abrtd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package abrt removed or service abrtd is not configured to start" operator="OR">
            <oval:extend_definition comment="abrt removed" definition_ref="oval:ssg-package_abrt_removed:def:1"/>
            <oval:criteria comment="service abrtd is not configured to start" operator="AND">
              <oval:criterion comment="abrtd not wanted by multi-user.target" test_ref="oval:ssg-test_abrtd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="abrtd socket not wanted by multi-user.target" test_ref="oval:ssg-test_abrtd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="abrtd is not running" test_ref="oval:ssg-test_service_not_running_abrtd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_acpid_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service acpid Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The acpid service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_acpid_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package acpid removed or service acpid is not configured to start" operator="OR">
            <oval:extend_definition comment="acpid removed" definition_ref="oval:ssg-package_acpid_removed:def:1"/>
            <oval:criteria comment="service acpid is not configured to start" operator="AND">
              <oval:criterion comment="acpid not wanted by multi-user.target" test_ref="oval:ssg-test_acpid_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="acpid socket not wanted by multi-user.target" test_ref="oval:ssg-test_acpid_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="acpid is not running" test_ref="oval:ssg-test_service_not_running_acpid:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_apparmor_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service apparmor Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The apparmor service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_apparmor_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package apparmor-parser installed and service apparmor is configured to start" operator="AND">
            <oval:extend_definition comment="apparmor-parser installed" definition_ref="oval:ssg-package_apparmor-parser_installed:def:1"/>
            <oval:criteria comment="service apparmor is configured to start and is running" operator="AND">
              <oval:criterion comment="apparmor is running" test_ref="oval:ssg-test_service_running_apparmor:tst:1"/>
              <oval:criteria comment="service apparmor is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants apparmor" test_ref="oval:ssg-test_multi_user_wants_apparmor:tst:1"/>
                <oval:criterion comment="multi-user.target wants apparmor socket" test_ref="oval:ssg-test_multi_user_wants_apparmor_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_atd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service atd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The atd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_atd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package at removed or service atd is not configured to start" operator="OR">
            <oval:extend_definition comment="at removed" definition_ref="oval:ssg-package_at_removed:def:1"/>
            <oval:criteria comment="service atd is not configured to start" operator="AND">
              <oval:criterion comment="atd not wanted by multi-user.target" test_ref="oval:ssg-test_atd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="atd socket not wanted by multi-user.target" test_ref="oval:ssg-test_atd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="atd is not running" test_ref="oval:ssg-test_service_not_running_atd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_auditd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service auditd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The auditd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_auditd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package audit installed and service auditd is configured to start" operator="AND">
            <oval:extend_definition comment="audit installed" definition_ref="oval:ssg-package_audit_installed:def:1"/>
            <oval:criteria comment="service auditd is configured to start and is running" operator="AND">
              <oval:criterion comment="auditd is running" test_ref="oval:ssg-test_service_running_auditd:tst:1"/>
              <oval:criteria comment="service auditd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants auditd" test_ref="oval:ssg-test_multi_user_wants_auditd:tst:1"/>
                <oval:criterion comment="multi-user.target wants auditd socket" test_ref="oval:ssg-test_multi_user_wants_auditd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_autofs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service autofs Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The autofs service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_autofs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package autofs removed or service autofs is not configured to start" operator="OR">
            <oval:extend_definition comment="autofs removed" definition_ref="oval:ssg-package_autofs_removed:def:1"/>
            <oval:criteria comment="service autofs is not configured to start" operator="AND">
              <oval:criterion comment="autofs not wanted by multi-user.target" test_ref="oval:ssg-test_autofs_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="autofs socket not wanted by multi-user.target" test_ref="oval:ssg-test_autofs_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="autofs is not running" test_ref="oval:ssg-test_service_not_running_autofs:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_avahi-daemon_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service avahi-daemon Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The avahi-daemon service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_avahi-daemon_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package avahi removed or service avahi-daemon is not configured to start" operator="OR">
            <oval:extend_definition comment="avahi removed" definition_ref="oval:ssg-package_avahi_removed:def:1"/>
            <oval:criteria comment="service avahi-daemon is not configured to start" operator="AND">
              <oval:criterion comment="avahi-daemon not wanted by multi-user.target" test_ref="oval:ssg-test_avahi-daemon_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="avahi-daemon socket not wanted by multi-user.target" test_ref="oval:ssg-test_avahi-daemon_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="avahi-daemon is not running" test_ref="oval:ssg-test_service_not_running_avahi-daemon:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_bluetooth_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service bluetooth Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The bluetooth service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_bluetooth_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package bluez removed or service bluetooth is not configured to start" operator="OR">
            <oval:extend_definition comment="bluez removed" definition_ref="oval:ssg-package_bluez_removed:def:1"/>
            <oval:criteria comment="service bluetooth is not configured to start" operator="AND">
              <oval:criterion comment="bluetooth not wanted by multi-user.target" test_ref="oval:ssg-test_bluetooth_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="bluetooth socket not wanted by multi-user.target" test_ref="oval:ssg-test_bluetooth_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="bluetooth is not running" test_ref="oval:ssg-test_service_not_running_bluetooth:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_certmonger_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service certmonger Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The certmonger service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_certmonger_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package certmonger removed or service certmonger is not configured to start" operator="OR">
            <oval:extend_definition comment="certmonger removed" definition_ref="oval:ssg-package_certmonger_removed:def:1"/>
            <oval:criteria comment="service certmonger is not configured to start" operator="AND">
              <oval:criterion comment="certmonger not wanted by multi-user.target" test_ref="oval:ssg-test_certmonger_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="certmonger socket not wanted by multi-user.target" test_ref="oval:ssg-test_certmonger_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="certmonger is not running" test_ref="oval:ssg-test_service_not_running_certmonger:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_cgconfig_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service cgconfig Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The cgconfig service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_cgconfig_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package libcgroup removed or service cgconfig is not configured to start" operator="OR">
            <oval:extend_definition comment="libcgroup removed" definition_ref="oval:ssg-package_libcgroup_removed:def:1"/>
            <oval:criteria comment="service cgconfig is not configured to start" operator="AND">
              <oval:criterion comment="cgconfig not wanted by multi-user.target" test_ref="oval:ssg-test_cgconfig_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cgconfig socket not wanted by multi-user.target" test_ref="oval:ssg-test_cgconfig_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cgconfig is not running" test_ref="oval:ssg-test_service_not_running_cgconfig:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_cgred_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service cgred Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The cgred service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_cgred_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package libcgroup-tools removed or service cgred is not configured to start" operator="OR">
            <oval:extend_definition comment="libcgroup-tools removed" definition_ref="oval:ssg-package_libcgroup-tools_removed:def:1"/>
            <oval:criteria comment="service cgred is not configured to start" operator="AND">
              <oval:criterion comment="cgred not wanted by multi-user.target" test_ref="oval:ssg-test_cgred_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cgred socket not wanted by multi-user.target" test_ref="oval:ssg-test_cgred_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cgred is not running" test_ref="oval:ssg-test_service_not_running_cgred:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_chronyd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service chronyd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The chronyd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_chronyd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package chrony installed and service chronyd is configured to start" operator="AND">
            <oval:extend_definition comment="chrony installed" definition_ref="oval:ssg-package_chrony_installed:def:1"/>
            <oval:criteria comment="service chronyd is configured to start and is running" operator="AND">
              <oval:criterion comment="chronyd is running" test_ref="oval:ssg-test_service_running_chronyd:tst:1"/>
              <oval:criteria comment="service chronyd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants chronyd" test_ref="oval:ssg-test_multi_user_wants_chronyd:tst:1"/>
                <oval:criterion comment="multi-user.target wants chronyd socket" test_ref="oval:ssg-test_multi_user_wants_chronyd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_cpupower_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service cpupower Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The cpupower service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_cpupower_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package kernel-tools removed or service cpupower is not configured to start" operator="OR">
            <oval:extend_definition comment="kernel-tools removed" definition_ref="oval:ssg-package_kernel-tools_removed:def:1"/>
            <oval:criteria comment="service cpupower is not configured to start" operator="AND">
              <oval:criterion comment="cpupower not wanted by multi-user.target" test_ref="oval:ssg-test_cpupower_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cpupower socket not wanted by multi-user.target" test_ref="oval:ssg-test_cpupower_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cpupower is not running" test_ref="oval:ssg-test_service_not_running_cpupower:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_crond_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service crond Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The crond service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_crond_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package cronie installed and service crond is configured to start" operator="AND">
            <oval:extend_definition comment="cronie installed" definition_ref="oval:ssg-package_cronie_installed:def:1"/>
            <oval:criteria comment="service crond is configured to start and is running" operator="AND">
              <oval:criterion comment="crond is running" test_ref="oval:ssg-test_service_running_crond:tst:1"/>
              <oval:criteria comment="service crond is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants crond" test_ref="oval:ssg-test_multi_user_wants_crond:tst:1"/>
                <oval:criterion comment="multi-user.target wants crond socket" test_ref="oval:ssg-test_multi_user_wants_crond_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_cups_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service cups Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The cups service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_cups_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package cups removed or service cups is not configured to start" operator="OR">
            <oval:extend_definition comment="cups removed" definition_ref="oval:ssg-package_cups_removed:def:1"/>
            <oval:criteria comment="service cups is not configured to start" operator="AND">
              <oval:criterion comment="cups not wanted by multi-user.target" test_ref="oval:ssg-test_cups_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cups socket not wanted by multi-user.target" test_ref="oval:ssg-test_cups_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="cups is not running" test_ref="oval:ssg-test_service_not_running_cups:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_debug-shell_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service debug-shell Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The debug-shell service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_debug-shell_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package systemd removed or service debug-shell is not configured to start" operator="OR">
            <oval:extend_definition comment="systemd removed" definition_ref="oval:ssg-package_systemd_removed:def:1"/>
            <oval:criteria comment="service debug-shell is not configured to start" operator="AND">
              <oval:criterion comment="debug-shell not wanted by multi-user.target" test_ref="oval:ssg-test_debug-shell_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="debug-shell socket not wanted by multi-user.target" test_ref="oval:ssg-test_debug-shell_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="debug-shell is not running" test_ref="oval:ssg-test_service_not_running_debug-shell:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_dhcpd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service dhcpd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The dhcpd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_dhcpd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package dhcp removed or service dhcpd is not configured to start" operator="OR">
            <oval:extend_definition comment="dhcp removed" definition_ref="oval:ssg-package_dhcp_removed:def:1"/>
            <oval:criteria comment="service dhcpd is not configured to start" operator="AND">
              <oval:criterion comment="dhcpd not wanted by multi-user.target" test_ref="oval:ssg-test_dhcpd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="dhcpd socket not wanted by multi-user.target" test_ref="oval:ssg-test_dhcpd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="dhcpd is not running" test_ref="oval:ssg-test_service_not_running_dhcpd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_docker_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service docker Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The docker service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_docker_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package docker installed and service docker is configured to start" operator="AND">
            <oval:extend_definition comment="docker installed" definition_ref="oval:ssg-package_docker_installed:def:1"/>
            <oval:criteria comment="service docker is configured to start and is running" operator="AND">
              <oval:criterion comment="docker is running" test_ref="oval:ssg-test_service_running_docker:tst:1"/>
              <oval:criteria comment="service docker is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants docker" test_ref="oval:ssg-test_multi_user_wants_docker:tst:1"/>
                <oval:criterion comment="multi-user.target wants docker socket" test_ref="oval:ssg-test_multi_user_wants_docker_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_dovecot_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service dovecot Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The dovecot service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_dovecot_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package dovecot removed or service dovecot is not configured to start" operator="OR">
            <oval:extend_definition comment="dovecot removed" definition_ref="oval:ssg-package_dovecot_removed:def:1"/>
            <oval:criteria comment="service dovecot is not configured to start" operator="AND">
              <oval:criterion comment="dovecot not wanted by multi-user.target" test_ref="oval:ssg-test_dovecot_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="dovecot socket not wanted by multi-user.target" test_ref="oval:ssg-test_dovecot_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="dovecot is not running" test_ref="oval:ssg-test_service_not_running_dovecot:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_firewalld_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service firewalld Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The firewalld service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_firewalld_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package firewalld installed and service firewalld is configured to start" operator="AND">
            <oval:extend_definition comment="firewalld installed" definition_ref="oval:ssg-package_firewalld_installed:def:1"/>
            <oval:criteria comment="service firewalld is configured to start and is running" operator="AND">
              <oval:criterion comment="firewalld is running" test_ref="oval:ssg-test_service_running_firewalld:tst:1"/>
              <oval:criteria comment="service firewalld is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants firewalld" test_ref="oval:ssg-test_multi_user_wants_firewalld:tst:1"/>
                <oval:criterion comment="multi-user.target wants firewalld socket" test_ref="oval:ssg-test_multi_user_wants_firewalld_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_httpd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service httpd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The httpd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_httpd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package httpd removed or service httpd is not configured to start" operator="OR">
            <oval:extend_definition comment="httpd removed" definition_ref="oval:ssg-package_httpd_removed:def:1"/>
            <oval:criteria comment="service httpd is not configured to start" operator="AND">
              <oval:criterion comment="httpd not wanted by multi-user.target" test_ref="oval:ssg-test_httpd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="httpd socket not wanted by multi-user.target" test_ref="oval:ssg-test_httpd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="httpd is not running" test_ref="oval:ssg-test_service_not_running_httpd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_irqbalance_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service irqbalance Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The irqbalance service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_irqbalance_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package irqbalance installed and service irqbalance is configured to start" operator="AND">
            <oval:extend_definition comment="irqbalance installed" definition_ref="oval:ssg-package_irqbalance_installed:def:1"/>
            <oval:criteria comment="service irqbalance is configured to start and is running" operator="AND">
              <oval:criterion comment="irqbalance is running" test_ref="oval:ssg-test_service_running_irqbalance:tst:1"/>
              <oval:criteria comment="service irqbalance is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants irqbalance" test_ref="oval:ssg-test_multi_user_wants_irqbalance:tst:1"/>
                <oval:criterion comment="multi-user.target wants irqbalance socket" test_ref="oval:ssg-test_multi_user_wants_irqbalance_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_kdump_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service kdump Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kdump service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_kdump_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package kexec-tools removed or service kdump is not configured to start" operator="OR">
            <oval:extend_definition comment="kexec-tools removed" definition_ref="oval:ssg-package_kexec-tools_removed:def:1"/>
            <oval:criteria comment="service kdump is not configured to start" operator="AND">
              <oval:criterion comment="kdump not wanted by multi-user.target" test_ref="oval:ssg-test_kdump_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="kdump socket not wanted by multi-user.target" test_ref="oval:ssg-test_kdump_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="kdump is not running" test_ref="oval:ssg-test_service_not_running_kdump:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_mdmonitor_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service mdmonitor Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The mdmonitor service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_mdmonitor_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package mdadm removed or service mdmonitor is not configured to start" operator="OR">
            <oval:extend_definition comment="mdadm removed" definition_ref="oval:ssg-package_mdadm_removed:def:1"/>
            <oval:criteria comment="service mdmonitor is not configured to start" operator="AND">
              <oval:criterion comment="mdmonitor not wanted by multi-user.target" test_ref="oval:ssg-test_mdmonitor_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="mdmonitor socket not wanted by multi-user.target" test_ref="oval:ssg-test_mdmonitor_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="mdmonitor is not running" test_ref="oval:ssg-test_service_not_running_mdmonitor:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_messagebus_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service messagebus Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The messagebus service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_messagebus_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package dbus removed or service messagebus is not configured to start" operator="OR">
            <oval:extend_definition comment="dbus removed" definition_ref="oval:ssg-package_dbus_removed:def:1"/>
            <oval:criteria comment="service messagebus is not configured to start" operator="AND">
              <oval:criterion comment="messagebus not wanted by multi-user.target" test_ref="oval:ssg-test_messagebus_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="messagebus socket not wanted by multi-user.target" test_ref="oval:ssg-test_messagebus_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="messagebus is not running" test_ref="oval:ssg-test_service_not_running_messagebus:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_named_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service named Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The named service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_named_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package bind removed or service named is not configured to start" operator="OR">
            <oval:extend_definition comment="bind removed" definition_ref="oval:ssg-package_bind_removed:def:1"/>
            <oval:criteria comment="service named is not configured to start" operator="AND">
              <oval:criterion comment="named not wanted by multi-user.target" test_ref="oval:ssg-test_named_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="named socket not wanted by multi-user.target" test_ref="oval:ssg-test_named_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="named is not running" test_ref="oval:ssg-test_service_not_running_named:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_nfs_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service nfs Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nfs service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_nfs_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service nfs is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service nfs is not configured to start" operator="AND">
              <oval:criterion comment="nfs not wanted by multi-user.target" test_ref="oval:ssg-test_nfs_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="nfs socket not wanted by multi-user.target" test_ref="oval:ssg-test_nfs_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="nfs is not running" test_ref="oval:ssg-test_service_not_running_nfs:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_nfslock_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service nfslock Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nfslock service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_nfslock_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service nfslock is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service nfslock is not configured to start" operator="AND">
              <oval:criterion comment="nfslock not wanted by multi-user.target" test_ref="oval:ssg-test_nfslock_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="nfslock socket not wanted by multi-user.target" test_ref="oval:ssg-test_nfslock_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="nfslock is not running" test_ref="oval:ssg-test_service_not_running_nfslock:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_ntpd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service ntpd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The ntpd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_ntpd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package ntp removed or service ntpd is not configured to start" operator="OR">
            <oval:extend_definition comment="ntp removed" definition_ref="oval:ssg-package_ntp_removed:def:1"/>
            <oval:criteria comment="service ntpd is not configured to start" operator="AND">
              <oval:criterion comment="ntpd not wanted by multi-user.target" test_ref="oval:ssg-test_ntpd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ntpd socket not wanted by multi-user.target" test_ref="oval:ssg-test_ntpd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ntpd is not running" test_ref="oval:ssg-test_service_not_running_ntpd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_ntpd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service ntpd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The ntpd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_ntpd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package ntp installed and service ntpd is configured to start" operator="AND">
            <oval:extend_definition comment="ntp installed" definition_ref="oval:ssg-package_ntp_installed:def:1"/>
            <oval:criteria comment="service ntpd is configured to start and is running" operator="AND">
              <oval:criterion comment="ntpd is running" test_ref="oval:ssg-test_service_running_ntpd:tst:1"/>
              <oval:criteria comment="service ntpd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants ntpd" test_ref="oval:ssg-test_multi_user_wants_ntpd:tst:1"/>
                <oval:criterion comment="multi-user.target wants ntpd socket" test_ref="oval:ssg-test_multi_user_wants_ntpd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_ntpdate_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service ntpdate Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The ntpdate service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_ntpdate_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package ntpdate removed or service ntpdate is not configured to start" operator="OR">
            <oval:extend_definition comment="ntpdate removed" definition_ref="oval:ssg-package_ntpdate_removed:def:1"/>
            <oval:criteria comment="service ntpdate is not configured to start" operator="AND">
              <oval:criterion comment="ntpdate not wanted by multi-user.target" test_ref="oval:ssg-test_ntpdate_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ntpdate socket not wanted by multi-user.target" test_ref="oval:ssg-test_ntpdate_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ntpdate is not running" test_ref="oval:ssg-test_service_not_running_ntpdate:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_oddjobd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service oddjobd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The oddjobd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_oddjobd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package oddjob removed or service oddjobd is not configured to start" operator="OR">
            <oval:extend_definition comment="oddjob removed" definition_ref="oval:ssg-package_oddjob_removed:def:1"/>
            <oval:criteria comment="service oddjobd is not configured to start" operator="AND">
              <oval:criterion comment="oddjobd not wanted by multi-user.target" test_ref="oval:ssg-test_oddjobd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="oddjobd socket not wanted by multi-user.target" test_ref="oval:ssg-test_oddjobd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="oddjobd is not running" test_ref="oval:ssg-test_service_not_running_oddjobd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_pcscd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service pcscd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The pcscd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_pcscd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package pcsc-lite installed and service pcscd is configured to start" operator="AND">
            <oval:extend_definition comment="pcsc-lite installed" definition_ref="oval:ssg-package_pcsc-lite_installed:def:1"/>
            <oval:criteria comment="service pcscd is configured to start and is running" operator="AND">
              <oval:criterion comment="pcscd is running" test_ref="oval:ssg-test_service_running_pcscd:tst:1"/>
              <oval:criteria comment="service pcscd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants pcscd" test_ref="oval:ssg-test_multi_user_wants_pcscd:tst:1"/>
                <oval:criterion comment="multi-user.target wants pcscd socket" test_ref="oval:ssg-test_multi_user_wants_pcscd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_portreserve_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service portreserve Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The portreserve service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_portreserve_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package portreserve removed or service portreserve is not configured to start" operator="OR">
            <oval:extend_definition comment="portreserve removed" definition_ref="oval:ssg-package_portreserve_removed:def:1"/>
            <oval:criteria comment="service portreserve is not configured to start" operator="AND">
              <oval:criterion comment="portreserve not wanted by multi-user.target" test_ref="oval:ssg-test_portreserve_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="portreserve socket not wanted by multi-user.target" test_ref="oval:ssg-test_portreserve_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="portreserve is not running" test_ref="oval:ssg-test_service_not_running_portreserve:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_postfix_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service postfix Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The postfix service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_postfix_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package postfix installed and service postfix is configured to start" operator="AND">
            <oval:extend_definition comment="postfix installed" definition_ref="oval:ssg-package_postfix_installed:def:1"/>
            <oval:criteria comment="service postfix is configured to start and is running" operator="AND">
              <oval:criterion comment="postfix is running" test_ref="oval:ssg-test_service_running_postfix:tst:1"/>
              <oval:criteria comment="service postfix is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants postfix" test_ref="oval:ssg-test_multi_user_wants_postfix:tst:1"/>
                <oval:criterion comment="multi-user.target wants postfix socket" test_ref="oval:ssg-test_multi_user_wants_postfix_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_psacct_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service psacct Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The psacct service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_psacct_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package psacct installed and service psacct is configured to start" operator="AND">
            <oval:extend_definition comment="psacct installed" definition_ref="oval:ssg-package_psacct_installed:def:1"/>
            <oval:criteria comment="service psacct is configured to start and is running" operator="AND">
              <oval:criterion comment="psacct is running" test_ref="oval:ssg-test_service_running_psacct:tst:1"/>
              <oval:criteria comment="service psacct is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants psacct" test_ref="oval:ssg-test_multi_user_wants_psacct:tst:1"/>
                <oval:criterion comment="multi-user.target wants psacct socket" test_ref="oval:ssg-test_multi_user_wants_psacct_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_qpidd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service qpidd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The qpidd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_qpidd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package qpid-cpp-server removed or service qpidd is not configured to start" operator="OR">
            <oval:extend_definition comment="qpid-cpp-server removed" definition_ref="oval:ssg-package_qpid-cpp-server_removed:def:1"/>
            <oval:criteria comment="service qpidd is not configured to start" operator="AND">
              <oval:criterion comment="qpidd not wanted by multi-user.target" test_ref="oval:ssg-test_qpidd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="qpidd socket not wanted by multi-user.target" test_ref="oval:ssg-test_qpidd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="qpidd is not running" test_ref="oval:ssg-test_service_not_running_qpidd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_quota_nld_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service quota_nld Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The quota_nld service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_quota_nld_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package quota-nld removed or service quota_nld is not configured to start" operator="OR">
            <oval:extend_definition comment="quota-nld removed" definition_ref="oval:ssg-package_quota-nld_removed:def:1"/>
            <oval:criteria comment="service quota_nld is not configured to start" operator="AND">
              <oval:criterion comment="quota_nld not wanted by multi-user.target" test_ref="oval:ssg-test_quota_nld_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="quota_nld socket not wanted by multi-user.target" test_ref="oval:ssg-test_quota_nld_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="quota_nld is not running" test_ref="oval:ssg-test_service_not_running_quota_nld:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rdisc_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rdisc Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rdisc service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rdisc_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package iputils removed or service rdisc is not configured to start" operator="OR">
            <oval:extend_definition comment="iputils removed" definition_ref="oval:ssg-package_iputils_removed:def:1"/>
            <oval:criteria comment="service rdisc is not configured to start" operator="AND">
              <oval:criterion comment="rdisc not wanted by multi-user.target" test_ref="oval:ssg-test_rdisc_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rdisc socket not wanted by multi-user.target" test_ref="oval:ssg-test_rdisc_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rdisc is not running" test_ref="oval:ssg-test_service_not_running_rdisc:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rexec_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rexec Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rexec service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rexec_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package rsh-server removed or service rexec is not configured to start" operator="OR">
            <oval:extend_definition comment="rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1"/>
            <oval:criteria comment="service rexec is not configured to start" operator="AND">
              <oval:criterion comment="rexec not wanted by multi-user.target" test_ref="oval:ssg-test_rexec_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rexec socket not wanted by multi-user.target" test_ref="oval:ssg-test_rexec_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rexec is not running" test_ref="oval:ssg-test_service_not_running_rexec:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rhnsd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rhnsd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rhnsd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rhnsd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package rhnsd removed or service rhnsd is not configured to start" operator="OR">
            <oval:extend_definition comment="rhnsd removed" definition_ref="oval:ssg-package_rhnsd_removed:def:1"/>
            <oval:criteria comment="service rhnsd is not configured to start" operator="AND">
              <oval:criterion comment="rhnsd not wanted by multi-user.target" test_ref="oval:ssg-test_rhnsd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rhnsd socket not wanted by multi-user.target" test_ref="oval:ssg-test_rhnsd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rhnsd is not running" test_ref="oval:ssg-test_service_not_running_rhnsd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rhsmcertd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rhsmcertd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rhsmcertd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rhsmcertd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package subscription-manager removed or service rhsmcertd is not configured to start" operator="OR">
            <oval:extend_definition comment="subscription-manager removed" definition_ref="oval:ssg-package_subscription-manager_removed:def:1"/>
            <oval:criteria comment="service rhsmcertd is not configured to start" operator="AND">
              <oval:criterion comment="rhsmcertd not wanted by multi-user.target" test_ref="oval:ssg-test_rhsmcertd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rhsmcertd socket not wanted by multi-user.target" test_ref="oval:ssg-test_rhsmcertd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rhsmcertd is not running" test_ref="oval:ssg-test_service_not_running_rhsmcertd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rlogin_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rlogin Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rlogin service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rlogin_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package rsh-server removed or service rlogin is not configured to start" operator="OR">
            <oval:extend_definition comment="rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1"/>
            <oval:criteria comment="service rlogin is not configured to start" operator="AND">
              <oval:criterion comment="rlogin not wanted by multi-user.target" test_ref="oval:ssg-test_rlogin_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rlogin socket not wanted by multi-user.target" test_ref="oval:ssg-test_rlogin_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rlogin is not running" test_ref="oval:ssg-test_service_not_running_rlogin:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rpcbind_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rpcbind Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rpcbind service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rpcbind_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service rpcbind is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service rpcbind is not configured to start" operator="AND">
              <oval:criterion comment="rpcbind not wanted by multi-user.target" test_ref="oval:ssg-test_rpcbind_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcbind socket not wanted by multi-user.target" test_ref="oval:ssg-test_rpcbind_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcbind is not running" test_ref="oval:ssg-test_service_not_running_rpcbind:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rpcgssd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rpcgssd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rpcgssd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rpcgssd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service rpcgssd is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service rpcgssd is not configured to start" operator="AND">
              <oval:criterion comment="rpcgssd not wanted by multi-user.target" test_ref="oval:ssg-test_rpcgssd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcgssd socket not wanted by multi-user.target" test_ref="oval:ssg-test_rpcgssd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcgssd is not running" test_ref="oval:ssg-test_service_not_running_rpcgssd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rpcidmapd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rpcidmapd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rpcidmapd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rpcidmapd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service rpcidmapd is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service rpcidmapd is not configured to start" operator="AND">
              <oval:criterion comment="rpcidmapd not wanted by multi-user.target" test_ref="oval:ssg-test_rpcidmapd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcidmapd socket not wanted by multi-user.target" test_ref="oval:ssg-test_rpcidmapd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcidmapd is not running" test_ref="oval:ssg-test_service_not_running_rpcidmapd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rpcsvcgssd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rpcsvcgssd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rpcsvcgssd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rpcsvcgssd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package nfs-utils removed or service rpcsvcgssd is not configured to start" operator="OR">
            <oval:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1"/>
            <oval:criteria comment="service rpcsvcgssd is not configured to start" operator="AND">
              <oval:criterion comment="rpcsvcgssd not wanted by multi-user.target" test_ref="oval:ssg-test_rpcsvcgssd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcsvcgssd socket not wanted by multi-user.target" test_ref="oval:ssg-test_rpcsvcgssd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rpcsvcgssd is not running" test_ref="oval:ssg-test_service_not_running_rpcsvcgssd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rsh_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rsh Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rsh service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_rsh_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package rsh removed or service rsh is not configured to start" operator="OR">
            <oval:extend_definition comment="rsh removed" definition_ref="oval:ssg-package_rsh_removed:def:1"/>
            <oval:criteria comment="service rsh is not configured to start" operator="AND">
              <oval:criterion comment="rsh not wanted by multi-user.target" test_ref="oval:ssg-test_rsh_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rsh socket not wanted by multi-user.target" test_ref="oval:ssg-test_rsh_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="rsh is not running" test_ref="oval:ssg-test_service_not_running_rsh:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_rsyslog_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service rsyslog Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The rsyslog service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_rsyslog_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package rsyslog installed and service rsyslog is configured to start" operator="AND">
            <oval:extend_definition comment="rsyslog installed" definition_ref="oval:ssg-package_rsyslog_installed:def:1"/>
            <oval:criteria comment="service rsyslog is configured to start and is running" operator="AND">
              <oval:criterion comment="rsyslog is running" test_ref="oval:ssg-test_service_running_rsyslog:tst:1"/>
              <oval:criteria comment="service rsyslog is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants rsyslog" test_ref="oval:ssg-test_multi_user_wants_rsyslog:tst:1"/>
                <oval:criterion comment="multi-user.target wants rsyslog socket" test_ref="oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_saslauthd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service saslauthd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The saslauthd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_saslauthd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package cyrus-sasl removed or service saslauthd is not configured to start" operator="OR">
            <oval:extend_definition comment="cyrus-sasl removed" definition_ref="oval:ssg-package_cyrus-sasl_removed:def:1"/>
            <oval:criteria comment="service saslauthd is not configured to start" operator="AND">
              <oval:criterion comment="saslauthd not wanted by multi-user.target" test_ref="oval:ssg-test_saslauthd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="saslauthd socket not wanted by multi-user.target" test_ref="oval:ssg-test_saslauthd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="saslauthd is not running" test_ref="oval:ssg-test_service_not_running_saslauthd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_smartd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service smartd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The smartd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_smartd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package smartmontools removed or service smartd is not configured to start" operator="OR">
            <oval:extend_definition comment="smartmontools removed" definition_ref="oval:ssg-package_smartmontools_removed:def:1"/>
            <oval:criteria comment="service smartd is not configured to start" operator="AND">
              <oval:criterion comment="smartd not wanted by multi-user.target" test_ref="oval:ssg-test_smartd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="smartd socket not wanted by multi-user.target" test_ref="oval:ssg-test_smartd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="smartd is not running" test_ref="oval:ssg-test_service_not_running_smartd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_smb_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service smb Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The smb service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_smb_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package samba removed or service smb is not configured to start" operator="OR">
            <oval:extend_definition comment="samba removed" definition_ref="oval:ssg-package_samba_removed:def:1"/>
            <oval:criteria comment="service smb is not configured to start" operator="AND">
              <oval:criterion comment="smb not wanted by multi-user.target" test_ref="oval:ssg-test_smb_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="smb socket not wanted by multi-user.target" test_ref="oval:ssg-test_smb_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="smb is not running" test_ref="oval:ssg-test_service_not_running_smb:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_snmpd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service snmpd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The snmpd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_snmpd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package net-snmp removed or service snmpd is not configured to start" operator="OR">
            <oval:extend_definition comment="net-snmp removed" definition_ref="oval:ssg-package_net-snmp_removed:def:1"/>
            <oval:criteria comment="service snmpd is not configured to start" operator="AND">
              <oval:criterion comment="snmpd not wanted by multi-user.target" test_ref="oval:ssg-test_snmpd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="snmpd socket not wanted by multi-user.target" test_ref="oval:ssg-test_snmpd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="snmpd is not running" test_ref="oval:ssg-test_service_not_running_snmpd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_squid_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service squid Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The squid service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_squid_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package squid removed or service squid is not configured to start" operator="OR">
            <oval:extend_definition comment="squid removed" definition_ref="oval:ssg-package_squid_removed:def:1"/>
            <oval:criteria comment="service squid is not configured to start" operator="AND">
              <oval:criterion comment="squid not wanted by multi-user.target" test_ref="oval:ssg-test_squid_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="squid socket not wanted by multi-user.target" test_ref="oval:ssg-test_squid_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="squid is not running" test_ref="oval:ssg-test_service_not_running_squid:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_sshd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service sshd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sshd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_sshd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package openssh removed or service sshd is not configured to start" operator="OR">
            <oval:extend_definition comment="openssh removed" definition_ref="oval:ssg-package_openssh_removed:def:1"/>
            <oval:criteria comment="service sshd is not configured to start" operator="AND">
              <oval:criterion comment="sshd not wanted by multi-user.target" test_ref="oval:ssg-test_sshd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sshd socket not wanted by multi-user.target" test_ref="oval:ssg-test_sshd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sshd is not running" test_ref="oval:ssg-test_service_not_running_sshd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_sshd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service sshd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sshd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_sshd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package openssh installed and service sshd is configured to start" operator="AND">
            <oval:extend_definition comment="openssh installed" definition_ref="oval:ssg-package_openssh_installed:def:1"/>
            <oval:criteria comment="service sshd is configured to start and is running" operator="AND">
              <oval:criterion comment="sshd is running" test_ref="oval:ssg-test_service_running_sshd:tst:1"/>
              <oval:criteria comment="service sshd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants sshd" test_ref="oval:ssg-test_multi_user_wants_sshd:tst:1"/>
                <oval:criterion comment="multi-user.target wants sshd socket" test_ref="oval:ssg-test_multi_user_wants_sshd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_sssd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service sssd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sssd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_sssd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package sssd removed or service sssd is not configured to start" operator="OR">
            <oval:extend_definition comment="sssd removed" definition_ref="oval:ssg-package_sssd_removed:def:1"/>
            <oval:criteria comment="service sssd is not configured to start" operator="AND">
              <oval:criterion comment="sssd not wanted by multi-user.target" test_ref="oval:ssg-test_sssd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sssd socket not wanted by multi-user.target" test_ref="oval:ssg-test_sssd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sssd is not running" test_ref="oval:ssg-test_service_not_running_sssd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_sssd_enabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service sssd Enabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sssd service should be enabled if possible.</oval:description>
            <oval:reference ref_id="service_sssd_enabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package sssd installed and service sssd is configured to start" operator="AND">
            <oval:extend_definition comment="sssd installed" definition_ref="oval:ssg-package_sssd_installed:def:1"/>
            <oval:criteria comment="service sssd is configured to start and is running" operator="AND">
              <oval:criterion comment="sssd is running" test_ref="oval:ssg-test_service_running_sssd:tst:1"/>
              <oval:criteria comment="service sssd is configured to start" operator="OR">
                <oval:criterion comment="multi-user.target wants sssd" test_ref="oval:ssg-test_multi_user_wants_sssd:tst:1"/>
                <oval:criterion comment="multi-user.target wants sssd socket" test_ref="oval:ssg-test_multi_user_wants_sssd_socket:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_sysstat_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service sysstat Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The sysstat service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_sysstat_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package sysstat removed or service sysstat is not configured to start" operator="OR">
            <oval:extend_definition comment="sysstat removed" definition_ref="oval:ssg-package_sysstat_removed:def:1"/>
            <oval:criteria comment="service sysstat is not configured to start" operator="AND">
              <oval:criterion comment="sysstat not wanted by multi-user.target" test_ref="oval:ssg-test_sysstat_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sysstat socket not wanted by multi-user.target" test_ref="oval:ssg-test_sysstat_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="sysstat is not running" test_ref="oval:ssg-test_service_not_running_sysstat:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_telnet_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service telnet Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The telnet service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_telnet_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package telnet removed or service telnet is not configured to start" operator="OR">
            <oval:extend_definition comment="telnet removed" definition_ref="oval:ssg-package_telnet_removed:def:1"/>
            <oval:criteria comment="service telnet is not configured to start" operator="AND">
              <oval:criterion comment="telnet not wanted by multi-user.target" test_ref="oval:ssg-test_telnet_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="telnet socket not wanted by multi-user.target" test_ref="oval:ssg-test_telnet_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="telnet is not running" test_ref="oval:ssg-test_service_not_running_telnet:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_tftp_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service tftp Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The tftp service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_tftp_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package tftp-server removed or service tftp is not configured to start" operator="OR">
            <oval:extend_definition comment="tftp-server removed" definition_ref="oval:ssg-package_tftp-server_removed:def:1"/>
            <oval:criteria comment="service tftp is not configured to start" operator="AND">
              <oval:criterion comment="tftp not wanted by multi-user.target" test_ref="oval:ssg-test_tftp_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="tftp socket not wanted by multi-user.target" test_ref="oval:ssg-test_tftp_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="tftp is not running" test_ref="oval:ssg-test_service_not_running_tftp:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_vsftpd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service vsftpd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The vsftpd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_vsftpd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package vsftpd removed or service vsftpd is not configured to start" operator="OR">
            <oval:extend_definition comment="vsftpd removed" definition_ref="oval:ssg-package_vsftpd_removed:def:1"/>
            <oval:criteria comment="service vsftpd is not configured to start" operator="AND">
              <oval:criterion comment="vsftpd not wanted by multi-user.target" test_ref="oval:ssg-test_vsftpd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="vsftpd socket not wanted by multi-user.target" test_ref="oval:ssg-test_vsftpd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="vsftpd is not running" test_ref="oval:ssg-test_service_not_running_vsftpd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_xinetd_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service xinetd Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The xinetd service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_xinetd_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package xinetd removed or service xinetd is not configured to start" operator="OR">
            <oval:extend_definition comment="xinetd removed" definition_ref="oval:ssg-package_xinetd_removed:def:1"/>
            <oval:criteria comment="service xinetd is not configured to start" operator="AND">
              <oval:criterion comment="xinetd not wanted by multi-user.target" test_ref="oval:ssg-test_xinetd_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="xinetd socket not wanted by multi-user.target" test_ref="oval:ssg-test_xinetd_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="xinetd is not running" test_ref="oval:ssg-test_service_not_running_xinetd:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_ypbind_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service ypbind Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The ypbind service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_ypbind_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package ypbind removed or service ypbind is not configured to start" operator="OR">
            <oval:extend_definition comment="ypbind removed" definition_ref="oval:ssg-package_ypbind_removed:def:1"/>
            <oval:criteria comment="service ypbind is not configured to start" operator="AND">
              <oval:criterion comment="ypbind not wanted by multi-user.target" test_ref="oval:ssg-test_ypbind_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ypbind socket not wanted by multi-user.target" test_ref="oval:ssg-test_ypbind_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="ypbind is not running" test_ref="oval:ssg-test_service_not_running_ypbind:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-service_zebra_disabled:def:1" version="1">
          <oval:metadata>
            <oval:title>Service zebra Disabled</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The zebra service should be disabled if possible.</oval:description>
            <oval:reference ref_id="service_zebra_disabled" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="package quagga removed or service zebra is not configured to start" operator="OR">
            <oval:extend_definition comment="quagga removed" definition_ref="oval:ssg-package_quagga_removed:def:1"/>
            <oval:criteria comment="service zebra is not configured to start" operator="AND">
              <oval:criterion comment="zebra not wanted by multi-user.target" test_ref="oval:ssg-test_zebra_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="zebra socket not wanted by multi-user.target" test_ref="oval:ssg-test_zebra_socket_not_wanted_by_multi_user_target:tst:1"/>
              <oval:criterion comment="zebra is not running" test_ref="oval:ssg-test_service_not_running_zebra:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_fs_suid_dumpable:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "fs.suid_dumpable" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "fs.suid_dumpable" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_fs_suid_dumpable" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="fs.suid_dumpable configuration setting check" definition_ref="oval:ssg-sysctl_static_fs_suid_dumpable:def:1"/>
            <oval:extend_definition comment="fs.suid_dumpable runtime setting check" definition_ref="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_kernel_kptr_restrict:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.kptr_restrict" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "kernel.kptr_restrict" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_kernel_kptr_restrict" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="kernel.kptr_restrict configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_kptr_restrict:def:1"/>
            <oval:extend_definition comment="kernel.kptr_restrict runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_kptr_restrict:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_kernel_randomize_va_space:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.randomize_va_space" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "kernel.randomize_va_space" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_kernel_randomize_va_space" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="kernel.randomize_va_space configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1"/>
            <oval:extend_definition comment="kernel.randomize_va_space runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.log_martians" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.log_martians configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.log_martians runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.all.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_all_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.all.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.all.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.log_martians" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.log_martians" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.log_martians configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_log_martians:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.log_martians runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_log_martians:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.conf.default.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_conf_default_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.conf.default.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1"/>
            <oval:extend_definition comment="net.ipv4.conf.default.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.icmp_echo_ignore_broadcasts" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1"/>
            <oval:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.icmp_ignore_bogus_error_responses" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1"/>
            <oval:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.ip_forward" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.ip_forward" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_ip_forward" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.ip_forward configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1"/>
            <oval:extend_definition comment="net.ipv4.ip_forward runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv4.tcp_syncookies" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv4_tcp_syncookies" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="net.ipv4.tcp_syncookies configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1"/>
            <oval:extend_definition comment="net.ipv4.tcp_syncookies runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.all.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_all_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_ra set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_redirects set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_source_route set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_disable_ipv6:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.disable_ipv6" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.all.disable_ipv6" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_all_disable_ipv6" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.disable_ipv6 set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.disable_ipv6 configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_disable_ipv6:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.disable_ipv6 runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_disable_ipv6:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.all.forwarding" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_all_forwarding" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.forwarding set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.forwarding configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.forwarding runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.default.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_default_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_ra set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.default.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.default.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_redirects set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route:def:1" version="4">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration and Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The "net.ipv6.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</oval:description>
            <oval:reference ref_id="sysctl_net_ipv6_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_source_route set correctly" operator="OR">
            <oval:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-sysctl_kernel_ipv6_disable:def:1"/>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "fs.suid_dumpable" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_fs_suid_dumpable" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter fs.suid_dumpable set to 0" test_ref="oval:ssg-test_sysctl_runtime_fs_suid_dumpable:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_kptr_restrict:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.kptr_restrict" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "kernel.kptr_restrict" parameter should be set to "1" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_kernel_kptr_restrict" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter kernel.kptr_restrict set to 1" test_ref="oval:ssg-test_sysctl_runtime_kernel_kptr_restrict:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.randomize_va_space" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_kernel_randomize_va_space" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter kernel.randomize_va_space set to 2" test_ref="oval:ssg-test_sysctl_runtime_kernel_randomize_va_space:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_log_martians:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_rp_filter:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_secure_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_all_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_send_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.log_martians" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.log_martians" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.log_martians set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_log_martians:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_rp_filter:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_secure_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_conf_default_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_send_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.ip_forward" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_ip_forward" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.ip_forward set to 0" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_ip_forward:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.tcp_syncookies" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv4_tcp_syncookies" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv4.tcp_syncookies set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv4_tcp_syncookies:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_ra set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_ra:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_disable_ipv6:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.disable_ipv6" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.disable_ipv6" parameter should be set to "1" in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_all_disable_ipv6" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.all.disable_ipv6 set to 1" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_all_forwarding" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.all.forwarding set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_forwarding:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_ra set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_ra:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Runtime Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</oval:description>
            <oval:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_fs_suid_dumpable:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "fs.suid_dumpable" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_fs_suid_dumpable" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter fs.suid_dumpable set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_fs_suid_dumpable:tst:1"/>
            <oval:criterion comment="kernel static parameter fs.suid_dumpable set to 0 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_fs_suid_dumpable:tst:1"/>
            <oval:criterion comment="kernel static parameter fs.suid_dumpable set to 0 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_fs_suid_dumpable:tst:1"/>
            <oval:criterion comment="kernel static parameter fs.suid_dumpable set to 0 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_fs_suid_dumpable:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_kernel_kptr_restrict:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.kptr_restrict" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "kernel.kptr_restrict" parameter should be set to "1" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_kernel_kptr_restrict" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter kernel.kptr_restrict set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_kernel_kptr_restrict:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.kptr_restrict set to 1 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_kernel_kptr_restrict:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.kptr_restrict set to 1 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_kernel_kptr_restrict:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.kptr_restrict set to 1 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_kernel_kptr_restrict:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "kernel.randomize_va_space" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_kernel_randomize_va_space" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter kernel.randomize_va_space set to 2 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_kernel_randomize_va_space:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.randomize_va_space set to 2 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_kernel_randomize_va_space:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.randomize_va_space set to 2 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_kernel_randomize_va_space:tst:1"/>
            <oval:criterion comment="kernel static parameter kernel.randomize_va_space set to 2 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_kernel_randomize_va_space:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_log_martians:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_rp_filter:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_secure_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_all_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_all_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_send_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_log_martians:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.log_martians" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.log_martians" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_log_martians" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.log_martians set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.log_martians set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.log_martians set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_log_martians:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.log_martians set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_log_martians:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_rp_filter" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_rp_filter:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_rp_filter:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_secure_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_secure_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_secure_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_conf_default_send_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_conf_default_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_send_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_send_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.ip_forward" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_ip_forward" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.ip_forward set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_ip_forward:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.ip_forward set to 0 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_ip_forward:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.ip_forward set to 0 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_ip_forward:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.ip_forward set to 0 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_ip_forward:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv4_tcp_syncookies" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv4_tcp_syncookies:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv4_tcp_syncookies:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv4_tcp_syncookies:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_tcp_syncookies:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_ra:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_disable_ipv6:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.disable_ipv6" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.disable_ipv6" parameter should be set to "1" in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_all_disable_ipv6" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.disable_ipv6 set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_all_disable_ipv6:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.disable_ipv6 set to 1 in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.disable_ipv6 set to 1 in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.disable_ipv6 set to 1 in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_all_forwarding" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_all_forwarding:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_forwarding:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_forwarding:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_forwarding:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_ra" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_ra:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_ra:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_redirects" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_redirects:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_redirects:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1" version="3">
          <oval:metadata>
            <oval:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</oval:description>
            <oval:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_source_route" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*.conf" test_ref="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /run/sysctl.d/*.conf" test_ref="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_source_route:tst:1"/>
            <oval:criterion comment="kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /usr/lib/sysctl.d/*.conf" test_ref="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_source_route:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_auditctl:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run semanage</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Test if auditctl is in use for audit rules.</oval:description>
            <oval:reference ref_id="audit_rules_auditctl" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="audit auditctl" test_ref="oval:ssg-test_audit_rules_auditctl:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_augenrules:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run semanage</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Test if augenrules is enabled for audit rules.</oval:description>
            <oval:reference ref_id="audit_rules_augenrules" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="audit augenrules" test_ref="oval:ssg-test_audit_rules_augenrules:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-auditd_conf_log_group_not_root:def:1" version="1">
          <oval:metadata>
            <oval:title>'log_group' Not Set To 'root' In /etc/audit/auditd.conf</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Verify 'log_group' is not set to 'root' in
      /etc/audit/auditd.conf.</oval:description>
            <oval:reference ref_id="auditd_conf_log_group_not_root" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Verify 'log_group' not set to 'root' in /etc/audit/auditd.conf" test_ref="oval:ssg-test_auditd_conf_log_group_not_root:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-grub2_default_exists:def:1" version="1">
          <oval:metadata>
            <oval:title>GRUB_CMDLINE_LINUX_DEFAULT existance check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check if GRUB_CMDLINE_LINUX_DEFAULT exists in /etc/default/grub.</oval:description>
            <oval:reference ref_id="grub2_default_exists" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion comment="check for GRUB_CMDLINE_LINUX_DEFAULT exists in /etc/default/grub" test_ref="oval:ssg-test_grub2_default_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-install_mcafee_hbss:def:1" version="1">
          <oval:metadata>
            <oval:title>Install McAfee Host-Based Intrusion Detection Software (HBSS)</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>McAfee Host-Based Intrusion Detection Software (HBSS) software
      should be installed.</oval:description>
            <oval:reference ref_id="install_mcafee_hbss" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1"/>
            <oval:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_accm:def:1"/>
            <oval:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_hips:def:1"/>
            <oval:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_pa:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_centos6:def:1" version="2">
          <oval:metadata>
            <oval:title>CentOS 6</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:centos:centos:6" source="CPE"/>
            <oval:description>The operating system installed on the system is
      CentOS 6</oval:description>
            <oval:reference ref_id="installed_OS_is_centos6" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="CentOS6 is installed" test_ref="oval:ssg-test_centos6:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_centos7:def:1" version="2">
          <oval:metadata>
            <oval:title>CentOS 7</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:centos:centos:7" source="CPE"/>
            <oval:description>The operating system installed on the system is
      CentOS 7</oval:description>
            <oval:reference ref_id="installed_OS_is_centos7" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="CentOS7 is installed" test_ref="oval:ssg-test_centos7:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_centos8:def:1" version="2">
          <oval:metadata>
            <oval:title>CentOS 8</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:centos:centos:8" source="CPE"/>
            <oval:description>The operating system installed on the system is
      CentOS 8</oval:description>
            <oval:reference ref_id="installed_OS_is_centos8" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="CentOS8 is installed" test_ref="oval:ssg-test_centos8:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_debian8:def:1" version="3">
          <oval:metadata>
            <oval:title>Debian 8</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:debian:debian_linux:8" source="CPE"/>
            <oval:description>The operating system installed on the system is Debian 8</oval:description>
            <oval:reference ref_id="installed_OS_is_debian8" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="current Debian version is Debian jessie" operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="Debian is installed" test_ref="oval:ssg-test_debian:tst:1"/>
            <oval:criterion comment="Debian8 is installed" test_ref="oval:ssg-test_debian_8:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_fedora:def:1" version="3">
          <oval:metadata>
            <oval:title>Installed operating system is Fedora</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:fedoraproject:fedora:28" source="CPE"/>
            <oval:description>The operating system installed on the system is Fedora</oval:description>
            <oval:reference ref_id="installed_OS_is_fedora" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="fedora-release RPM package is installed" test_ref="oval:ssg-test_fedora_release_rpm:tst:1"/>
            <oval:criterion comment="CPE vendor is 'fedoraproject' and product is 'fedora'" test_ref="oval:ssg-test_fedora_vendor_product:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ol6_family:def:1" version="1">
          <oval:metadata>
            <oval:title>Oracle Linux 6</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:oracle:linux:6" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Oracle Linux 6</oval:description>
            <oval:reference ref_id="installed_OS_is_ol6_family" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="Oracle Linux 6 System is installed" test_ref="oval:ssg-test_ol6_system:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ol7_family:def:1" version="1">
          <oval:metadata>
            <oval:title>Oracle Linux 7</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:oracle:linux:7" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Oracle Linux 7</oval:description>
            <oval:reference ref_id="installed_OS_is_ol7_family" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="Oracle Linux 7 System is installed" test_ref="oval:ssg-test_ol7_system:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ol8_family:def:1" version="1">
          <oval:metadata>
            <oval:title>Oracle Linux 8</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:oracle:linux:8" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Oracle Linux 8</oval:description>
            <oval:reference ref_id="installed_OS_is_ol8_family" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="Oracle Linux 8 System is installed" test_ref="oval:ssg-test_ol8_system:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse:def:1" version="1">
          <oval:metadata>
            <oval:title>openSUSE</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The operating system installed on the system is openSUSE.</oval:description>
            <oval:reference ref_id="installed_OS_is_opensuse" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="openSUSE is installed" test_ref="oval:ssg-test_opensuse_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse_leap15:def:1" version="1">
          <oval:metadata>
            <oval:title>openSUSE Leap 15</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:opensuse:leap:15.0" source="CPE"/>
            <oval:description>The operating system installed on the system is openSUSE Leap 15.</oval:description>
            <oval:reference ref_id="installed_OS_is_opensuse_leap15" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="openSUSE is installed" definition_ref="oval:ssg-installed_OS_is_opensuse:def:1"/>
            <oval:criterion comment="openSUSE Leap 15 is installed" test_ref="oval:ssg-test_opensuse_leap15_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse_leap42:def:1" version="1">
          <oval:metadata>
            <oval:title>openSUSE Leap 42</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:opensuse:leap:42.1" source="CPE"/>
            <oval:reference ref_id="cpe:/o:opensuse:leap:42.2" source="CPE"/>
            <oval:reference ref_id="cpe:/o:opensuse:leap:42.3" source="CPE"/>
            <oval:description>The operating system installed on the system is openSUSE Leap 42.</oval:description>
            <oval:reference ref_id="installed_OS_is_opensuse_leap42" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="openSUSE is installed" definition_ref="oval:ssg-installed_OS_is_opensuse:def:1"/>
            <oval:criterion comment="openSUSE Leap 42 is installed" test_ref="oval:ssg-test_opensuse_leap42_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
          <oval:metadata>
            <oval:title>Installed operating system is part of the Unix family</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The operating system installed on the system is part of the Unix OS family</oval:description>
            <oval:reference ref_id="installed_OS_is_part_of_Unix_family" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_family:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_rhel6:def:1" version="2">
          <oval:metadata>
            <oval:title>Red Hat Enterprise Linux 6</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Red Hat Enterprise Linux 6</oval:description>
            <oval:reference ref_id="installed_OS_is_rhel6" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="RHEL 6 Client is installed" test_ref="oval:ssg-test_rhel_client:tst:1"/>
              <oval:criterion comment="RHEL 6 Workstation is installed" test_ref="oval:ssg-test_rhel_workstation:tst:1"/>
              <oval:criterion comment="RHEL 6 Server is installed" test_ref="oval:ssg-test_rhel_server:tst:1"/>
              <oval:criterion comment="RHEL 6 Compute Node is installed" test_ref="oval:ssg-test_rhel_computenode:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_rhel7:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat Enterprise Linux 7</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:redhat:enterprise_linux:7" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Red Hat Enterprise Linux 7</oval:description>
            <oval:reference ref_id="installed_OS_is_rhel7" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel7_unix_family:tst:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="RHEL 7 Client is installed" test_ref="oval:ssg-test_rhel7_client:tst:1"/>
              <oval:criterion comment="RHEL 7 Workstation is installed" test_ref="oval:ssg-test_rhel7_workstation:tst:1"/>
              <oval:criterion comment="RHEL 7 Server is installed" test_ref="oval:ssg-test_rhel7_server:tst:1"/>
              <oval:criterion comment="RHEL 7 Compute Node is installed" test_ref="oval:ssg-test_rhel7_computenode:tst:1"/>
              <oval:criteria comment="Red Hat Enterpise Virtualization Host is installed" operator="AND">
                <oval:criterion comment="redhat-release-virtualization-host RPM package is installed" test_ref="oval:ssg-test_redhat_release_virtualization_host_rpm:tst:1"/>
                <oval:criterion comment="Red Hat Enterpise Virtualization Host is based on RHEL 7" test_ref="oval:ssg-test_rhev_rhel_version:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_rhel8:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat Enterprise Linux 8</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:redhat:enterprise_linux:8" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Red Hat Enterprise Linux 8</oval:description>
            <oval:reference ref_id="installed_OS_is_rhel8" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel8_unix_family:tst:1"/>
            <oval:criterion comment="RHEL 8 is installed" test_ref="oval:ssg-test_rhel8:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_rhv4:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat Virtualization 4</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:redhat:virtualization:4" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Red Hat Virtualization Host 4 or Red Hat Enterprise Host.</oval:description>
            <oval:reference ref_id="installed_OS_is_rhv4" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="Red Hat Virtualization Host (RHVH)" test_ref="oval:ssg-test_rhvh4_version:tst:1"/>
              <oval:criterion comment="Red Hat Virtualization Host is based on RHEL (RHELH)" test_ref="oval:ssg-test_rhelh4_version:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_sl6:def:1" version="2">
          <oval:metadata>
            <oval:title>Scientific Linux 6</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Scientific Linux 6</oval:description>
            <oval:reference ref_id="installed_OS_is_sl6" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="Scientific Linux 6 is installed" test_ref="oval:ssg-test_sl6:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_sl7:def:1" version="2">
          <oval:metadata>
            <oval:title>Scientific Linux 7</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:scientificlinux:scientificlinux:7" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Scientific Linux 7</oval:description>
            <oval:reference ref_id="installed_OS_is_sl7" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="Scientific Linux 7 is installed" test_ref="oval:ssg-test_sl7:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_sl8:def:1" version="2">
          <oval:metadata>
            <oval:title>Scientific Linux 8</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:scientificlinux:scientificlinux:8" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Scientific Linux 8</oval:description>
            <oval:reference ref_id="installed_OS_is_sl8" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="Scientific Linux 8 is installed" test_ref="oval:ssg-test_sl8:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_sle11:def:1" version="1">
          <oval:metadata>
            <oval:title>SUSE Linux Enterprise 11</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:suse:linux_enterprise_server:11" source="CPE"/>
            <oval:reference ref_id="cpe:/o:suse:linux_enterprise_desktop:11" source="CPE"/>
            <oval:description>The operating system installed on the system is
      SUSE Linux Enterprise 11.</oval:description>
            <oval:reference ref_id="installed_OS_is_sle11" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_sle11_unix_family:tst:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="SLE 11 Desktop is installed" test_ref="oval:ssg-test_sle11_desktop:tst:1"/>
              <oval:criterion comment="SLE 11 Server is installed" test_ref="oval:ssg-test_sle11_server:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_sle12:def:1" version="1">
          <oval:metadata>
            <oval:title>SUSE Linux Enterprise 12</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:suse:linux_enterprise_server:12" source="CPE"/>
            <oval:reference ref_id="cpe:/o:suse:linux_enterprise_desktop:12" source="CPE"/>
            <oval:description>The operating system installed on the system is
      SUSE Linux Enterprise 12.</oval:description>
            <oval:reference ref_id="installed_OS_is_sle12" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_sle12_unix_family:tst:1"/>
            <oval:criteria operator="OR">
              <oval:criterion comment="SLE 12 Desktop is installed" test_ref="oval:ssg-test_sle12_desktop:tst:1"/>
              <oval:criterion comment="SLE 12 Server is installed" test_ref="oval:ssg-test_sle12_server:tst:1"/>
              <oval:criterion comment="SLE 12 Server for SAP Applications is installed" test_ref="oval:ssg-test_sle12_sap:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu:def:1" version="1">
          <oval:metadata>
            <oval:title>Ubuntu</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The operating system installed is an Ubuntu System</oval:description>
            <oval:reference ref_id="installed_OS_is_ubuntu" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="System is Ubuntu" operator="AND">
            <oval:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <oval:criterion comment="lsb-based distrib" test_ref="oval:ssg-test_lsb:tst:1"/>
            <oval:criterion comment="Ubuntu is installed" test_ref="oval:ssg-test_ubuntu:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1404:def:1" version="1">
          <oval:metadata>
            <oval:title>Ubuntu 1404</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:canonical:ubuntu_linux:14.04" source="CPE"/>
            <oval:description>The operating system installed on the system is Ubuntu 1404</oval:description>
            <oval:reference ref_id="installed_OS_is_ubuntu1404" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="current Ubuntu version is Trusty" operator="AND">
            <oval:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <oval:criterion comment="Trusty is installed" test_ref="oval:ssg-test_ubuntu_trusty:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1604:def:1" version="1">
          <oval:metadata>
            <oval:title>Ubuntu 1604</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:canonical:ubuntu_linux:16.04" source="CPE"/>
            <oval:description>The operating system installed on the system is Ubuntu 1604</oval:description>
            <oval:reference ref_id="installed_OS_is_ubuntu1604" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="current Ubuntu version is Xenial" operator="AND">
            <oval:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <oval:criterion comment="Xenial is installed" test_ref="oval:ssg-test_ubuntu_xenial:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1804:def:1" version="1">
          <oval:metadata>
            <oval:title>Ubuntu 1804</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:canonical:ubuntu_linux:18.04" source="CPE"/>
            <oval:description>The operating system installed on the system is Ubuntu 1804</oval:description>
            <oval:reference ref_id="installed_OS_is_ubuntu1804" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="current Ubuntu version is Bionic" operator="AND">
            <oval:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <oval:criterion comment="Bionic is installed" test_ref="oval:ssg-test_ubuntu_bionic:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_OS_is_wrlinux:def:1" version="1">
          <oval:metadata>
            <oval:title>WRLinux</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/o:windriver:wrlinux" source="CPE"/>
            <oval:description>The operating system installed on the system is
      Wind River Linux</oval:description>
            <oval:reference ref_id="installed_OS_is_wrlinux" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_wrlinux:tst:1"/>
            <oval:criterion comment="WRLinux is installed" test_ref="oval:ssg-test_wrlinux:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_app_is_ocp3:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat OpenShift Container Platform</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/a:redhat:openshift_container_platform:3.10" source="CPE"/>
            <oval:reference ref_id="cpe:/a:redhat:openshift_container_platform:3.11" source="CPE"/>
            <oval:description>The application installed installed on the system is
      OpenShift 3.</oval:description>
            <oval:reference ref_id="installed_app_is_ocp3" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <oval:criterion comment="OpenShift Node is installed" test_ref="oval:ssg-test_ocp3_node:tst:1"/>
            <oval:criterion comment="OpenShift Hyperkube is installed" test_ref="oval:ssg-test_ocp3_hyperkube:tst:1"/>
            <oval:criterion comment="Atomic OpenShift is installed" test_ref="oval:ssg-test_ocp3_atomic:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_app_is_rhosp13:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat OpenStack Platform</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/a:redhat:openstack:13.0" source="CPE"/>
            <oval:description>The application installed installed on the system is
      Red Hat OpenStack Platform 13.</oval:description>
            <oval:reference ref_id="installed_app_is_rhosp13" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <oval:criterion comment="OpenStack is installed" test_ref="oval:ssg-test_rhosp13_release:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_app_is_rhv4:def:1" version="1">
          <oval:metadata>
            <oval:title>Red Hat Virtualization 4</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:reference ref_id="cpe:/a:redhat:virtualization:4" source="CPE"/>
            <oval:description>The application installed installed on the system is
      Red Hat Virtualization 4.</oval:description>
            <oval:reference ref_id="installed_app_is_rhv4" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <oval:criterion comment="Red Hat Virtualization Manager (RHVM)" test_ref="oval:ssg-test_rhevm4_version:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_libuser_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package libuser is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package libuser is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:libuser" source="CPE"/>
            <oval:reference ref_id="installed_env_has_libuser_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package libuser is installed" test_ref="oval:ssg-test_env_has_libuser_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_nss-pam-ldapd_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package nss-pam-ldapd is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package nss-pam-ldapd is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:nss-pam-ldapd" source="CPE"/>
            <oval:reference ref_id="installed_env_has_nss-pam-ldapd_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package nss-pam-ldapd is installed" test_ref="oval:ssg-test_env_has_nss-pam-ldapd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_pam_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package pam is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package pam is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:pam" source="CPE"/>
            <oval:reference ref_id="installed_env_has_pam_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package pam is installed" test_ref="oval:ssg-test_env_has_pam_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_shadow-utils_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package shadow-utils is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package shadow-utils is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:shadow-utils" source="CPE"/>
            <oval:reference ref_id="installed_env_has_shadow-utils_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package shadow-utils is installed" test_ref="oval:ssg-test_env_has_shadow-utils_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_systemd_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package systemd is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package systemd is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:systemd" source="CPE"/>
            <oval:reference ref_id="installed_env_has_systemd_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package systemd is installed" test_ref="oval:ssg-test_env_has_systemd_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_yum_or_zypper_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package yum or zypper is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package yum or zypper is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:yum_or_zypper" source="CPE"/>
            <oval:reference ref_id="installed_env_has_yum_or_zypper_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Package yum is installed" test_ref="oval:ssg-test_env_yumorzypper_has_yum_installed:tst:1"/>
            <oval:criterion comment="Package zypper is installed" test_ref="oval:ssg-test_env_has_zypper_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_has_yum_package:def:1" version="1">
          <oval:metadata>
            <oval:title>Package yum is installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Checks if package yum is installed.</oval:description>
            <oval:reference ref_id="cpe:/a:yum" source="CPE"/>
            <oval:reference ref_id="installed_env_has_yum_package" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Package yum is installed" test_ref="oval:ssg-test_env_has_yum_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_is_a_container:def:1" version="2">
          <oval:metadata>
            <oval:title>Check if the scan target is a container</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check for presence of files characterizing container filesystems.</oval:description>
            <oval:reference ref_id="cpe:/a:container" source="CPE"/>
            <oval:reference ref_id="installed_env_is_a_container" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Check if /.dockerenv exists" test_ref="oval:ssg-test_installed_env_is_a_docker_container:tst:1"/>
            <oval:criterion comment="Check if /run/.containerenv exists" test_ref="oval:ssg-test_installed_env_is_a_podman_container:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="inventory" id="oval:ssg-installed_env_is_a_machine:def:1" version="2">
          <oval:metadata>
            <oval:title>Check if the scan target is a machine</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check for absence of files characterizing container filesystems.</oval:description>
            <oval:reference ref_id="cpe:/a:machine" source="CPE"/>
            <oval:reference ref_id="installed_env_is_a_machine" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:extend_definition comment="If environment is not a container, it is machine" definition_ref="oval:ssg-installed_env_is_a_container:def:1" negate="true"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_not_required_or_unset:def:1" version="1">
          <oval:metadata>
            <oval:title>SSHD is not required to be installed or requirement not set</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>If SSHD is not required, we check it is not installed. If SSH requirement is unset, we are good.</oval:description>
            <oval:reference ref_id="sshd_not_required_or_unset" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH not required or not set" operator="OR">
            <oval:criterion test_ref="oval:ssg-test_sshd_not_required:tst:1"/>
            <oval:extend_definition comment="SSH requirement is unset" definition_ref="oval:ssg-sshd_requirement_unset:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_required_or_unset:def:1" version="1">
          <oval:metadata>
            <oval:title>SSHD is required to be installed or requirement not set</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>If SSHD is required, we check it is installed. If SSH requirement is unset, we are good.</oval:description>
            <oval:reference ref_id="sshd_required_or_unset" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="SSH required or not set" operator="OR">
            <oval:criterion test_ref="oval:ssg-test_sshd_required:tst:1"/>
            <oval:extend_definition comment="SSH requirement is unset" definition_ref="oval:ssg-sshd_requirement_unset:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_requirement_unset:def:1" version="1">
          <oval:metadata>
            <oval:title>It doesn't matter if sshd is installed or not</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Test if value sshd_required is 0.</oval:description>
            <oval:reference ref_id="sshd_requirement_unset" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_sshd_requirement_unset:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sshd_version_equal_or_higher_than_74:def:1" version="1">
          <oval:metadata>
            <oval:title>OpenSSH Server is 7.4 or newer</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Check if version of OpenSSH Server is equal or higher than 7.4</oval:description>
            <oval:reference ref_id="sshd_version_equal_or_higher_than_74" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="OpenSSH Server version is equal or higher than 7.4" operator="OR">
            <oval:criteria comment="System uses RPM based packages" operator="AND">
              <oval:criteria comment="System uses RPM based packages" operator="OR">
                <oval:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
                <oval:extend_definition comment="RHEL6 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1"/>
                <oval:extend_definition comment="CentOS7 OS installed" definition_ref="oval:ssg-installed_OS_is_centos7:def:1"/>
                <oval:extend_definition comment="CentOS6 OS installed" definition_ref="oval:ssg-installed_OS_is_centos6:def:1"/>
                <oval:extend_definition comment="Fedora OS installed" definition_ref="oval:ssg-installed_OS_is_fedora:def:1"/>
                <oval:extend_definition comment="openSUSE OS installed" definition_ref="oval:ssg-installed_OS_is_opensuse:def:1"/>
                <oval:extend_definition comment="SLE11 OS installed" definition_ref="oval:ssg-installed_OS_is_sle11:def:1"/>
                <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
                <oval:extend_definition comment="Installed OS is OL7" definition_ref="oval:ssg-installed_OS_is_ol7_family:def:1"/>
                <oval:extend_definition comment="Installed OS is OL8" definition_ref="oval:ssg-installed_OS_is_ol8_family:def:1"/>
              </oval:criteria>
              <oval:criterion comment="Check RPM OpenSSH Server is equal or higher than 7.4" test_ref="oval:ssg-test_rpm_openssh-server_version:tst:1"/>
            </oval:criteria>
            <oval:criteria comment="System uses DEB based packages" operator="AND">
              <oval:criteria comment="System uses RPM based packages" operator="OR">
                <oval:extend_definition comment="Ubuntu 1404 OS installed" definition_ref="oval:ssg-installed_OS_is_ubuntu1404:def:1"/>
                <oval:extend_definition comment="Ubuntu 1604 OS installed" definition_ref="oval:ssg-installed_OS_is_ubuntu1604:def:1"/>
                <oval:extend_definition comment="Ubuntu 1804 OS installed" definition_ref="oval:ssg-installed_OS_is_ubuntu1804:def:1"/>
                <oval:extend_definition comment="Debian 8 OS installed" definition_ref="oval:ssg-installed_OS_is_debian8:def:1"/>
              </oval:criteria>
              <oval:criterion comment="Check DEB version of OpenSSH Server is equal or higher than 7.4" test_ref="oval:ssg-test_deb_openssh-server_version:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sssd_conf_exists:def:1" version="1">
          <oval:metadata>
            <oval:title>Verify The SSSD Configuration File Exists</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The /etc/sssd/sssd.conf file should exist if it is
      in use.</oval:description>
            <oval:reference ref_id="sssd_conf_exists" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Check if sssd_conf_exists" test_ref="oval:ssg-test_sssd_conf_exists:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-sysctl_kernel_ipv6_disable:def:1" version="2">
          <oval:metadata>
            <oval:title>Kernel Runtime Parameter IPv6 Check</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Disables IPv6 for all network interfaces.</oval:description>
            <oval:reference ref_id="sysctl_kernel_ipv6_disable" source="ssg"/>
          </oval:metadata>
          <oval:criteria comment="IPv6 disabled or net.ipv6.conf.all.disable_ipv6 set correctly" operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="net.ipv6.conf.all.disable_ipv6 configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_disable_ipv6:def:1"/>
              <oval:extend_definition comment="net.ipv6.conf.all.disable_ipv6 runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_disable_ipv6:def:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-system_info_architecture_64bit:def:1" version="1">
          <oval:metadata>
            <oval:title>Test for 64-bit Architecture</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Generic test for 64-bit architectures to be used by other tests</oval:description>
            <oval:reference ref_id="system_info_architecture_64bit" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:extend_definition comment="Generic test for x86_64 architecture" definition_ref="oval:ssg-system_info_architecture_x86_64:def:1"/>
            <oval:extend_definition comment="Generic test for ppc64 architecture" definition_ref="oval:ssg-system_info_architecture_ppc_64:def:1"/>
            <oval:extend_definition comment="Generic test for aarch64 architecture" definition_ref="oval:ssg-system_info_architecture_aarch_64:def:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-system_info_architecture_aarch_64:def:1" version="1">
          <oval:metadata>
            <oval:title>Test for aarch_64 Architecture</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Generic test for aarch_64 architecture to be used by other tests</oval:description>
            <oval:reference ref_id="system_info_architecture_aarch_64" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Generic test for aarch_64 architecture" test_ref="oval:ssg-test_system_info_architecture_aarch_64:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-system_info_architecture_ppc_64:def:1" version="1">
          <oval:metadata>
            <oval:title>Test for PPC and PPCLE Architecture</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Generic test for PPC PPC64LE architecture to be used by other tests</oval:description>
            <oval:reference ref_id="system_info_architecture_ppc_64" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criterion comment="Generic test for ppc64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppc_64:tst:1"/>
            <oval:criterion comment="Generic test for ppcle64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppcle_64:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-system_info_architecture_x86:def:1" version="1">
          <oval:metadata>
            <oval:title>Test for x86 Architecture</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Generic test for x86 architecture to be used by other tests</oval:description>
            <oval:reference ref_id="system_info_architecture_x86" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Generic test for x86 architecture" test_ref="oval:ssg-test_system_info_architecture_x86:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-system_info_architecture_x86_64:def:1" version="1">
          <oval:metadata>
            <oval:title>Test for x86_64 Architecture</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Generic test for x86_64 architecture to be used by other tests</oval:description>
            <oval:reference ref_id="system_info_architecture_x86_64" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="Generic test for x86_64 architecture" test_ref="oval:ssg-test_system_info_architecture_x86_64:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-var_accounts_user_umask_as_number:def:1" version="1">
          <oval:metadata>
            <oval:title>Value of 'var_accounts_user_umask' variable represented as octal number</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Value of 'var_accounts_user_umask' variable represented as octal number</oval:description>
            <oval:reference ref_id="var_accounts_user_umask_as_number" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="AND">
            <oval:criterion test_ref="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - chmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_chmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit chmod" test_ref="oval:ssg-test_32bit_ardm_chmod_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit chmod" test_ref="oval:ssg-test_64bit_ardm_chmod_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit chmod" test_ref="oval:ssg-test_32bit_ardm_chmod_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit chmod" test_ref="oval:ssg-test_64bit_ardm_chmod_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chown:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - chown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_chown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit chown" test_ref="oval:ssg-test_32bit_ardm_chown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit chown" test_ref="oval:ssg-test_64bit_ardm_chown_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit chown" test_ref="oval:ssg-test_32bit_ardm_chown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit chown" test_ref="oval:ssg-test_64bit_ardm_chown_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fchmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fchmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fchmod" test_ref="oval:ssg-test_32bit_ardm_fchmod_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fchmod" test_ref="oval:ssg-test_64bit_ardm_fchmod_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fchmod" test_ref="oval:ssg-test_32bit_ardm_fchmod_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fchmod" test_ref="oval:ssg-test_64bit_ardm_fchmod_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fchmodat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fchmodat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fchmodat" test_ref="oval:ssg-test_32bit_ardm_fchmodat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fchmodat" test_ref="oval:ssg-test_64bit_ardm_fchmodat_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fchmodat" test_ref="oval:ssg-test_32bit_ardm_fchmodat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fchmodat" test_ref="oval:ssg-test_64bit_ardm_fchmodat_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchown:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fchown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fchown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fchown" test_ref="oval:ssg-test_32bit_ardm_fchown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fchown" test_ref="oval:ssg-test_64bit_ardm_fchown_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fchown" test_ref="oval:ssg-test_32bit_ardm_fchown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fchown" test_ref="oval:ssg-test_64bit_ardm_fchown_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchownat:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fchownat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fchownat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fchownat" test_ref="oval:ssg-test_32bit_ardm_fchownat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fchownat" test_ref="oval:ssg-test_64bit_ardm_fchownat_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fchownat" test_ref="oval:ssg-test_32bit_ardm_fchownat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fchownat" test_ref="oval:ssg-test_64bit_ardm_fchownat_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fremovexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fremovexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fremovexattr" test_ref="oval:ssg-test_32bit_ardm_fremovexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fremovexattr" test_ref="oval:ssg-test_64bit_ardm_fremovexattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fremovexattr" test_ref="oval:ssg-test_32bit_ardm_fremovexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fremovexattr" test_ref="oval:ssg-test_64bit_ardm_fremovexattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - fsetxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_fsetxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit fsetxattr" test_ref="oval:ssg-test_32bit_ardm_fsetxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit fsetxattr" test_ref="oval:ssg-test_64bit_ardm_fsetxattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit fsetxattr" test_ref="oval:ssg-test_32bit_ardm_fsetxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit fsetxattr" test_ref="oval:ssg-test_64bit_ardm_fsetxattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lchown:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - lchown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_lchown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit lchown" test_ref="oval:ssg-test_32bit_ardm_lchown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit lchown" test_ref="oval:ssg-test_64bit_ardm_lchown_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit lchown" test_ref="oval:ssg-test_32bit_ardm_lchown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit lchown" test_ref="oval:ssg-test_64bit_ardm_lchown_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - lremovexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_lremovexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit lremovexattr" test_ref="oval:ssg-test_32bit_ardm_lremovexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit lremovexattr" test_ref="oval:ssg-test_64bit_ardm_lremovexattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit lremovexattr" test_ref="oval:ssg-test_32bit_ardm_lremovexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit lremovexattr" test_ref="oval:ssg-test_64bit_ardm_lremovexattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - lsetxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_lsetxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit lsetxattr" test_ref="oval:ssg-test_32bit_ardm_lsetxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit lsetxattr" test_ref="oval:ssg-test_64bit_ardm_lsetxattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit lsetxattr" test_ref="oval:ssg-test_32bit_ardm_lsetxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit lsetxattr" test_ref="oval:ssg-test_64bit_ardm_lsetxattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_removexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - removexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_removexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit removexattr" test_ref="oval:ssg-test_32bit_ardm_removexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit removexattr" test_ref="oval:ssg-test_64bit_ardm_removexattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit removexattr" test_ref="oval:ssg-test_32bit_ardm_removexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit removexattr" test_ref="oval:ssg-test_64bit_ardm_removexattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_setxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Audit Discretionary Access Control Modification Events - setxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The changing of file permissions, attributes, mount points, and opening of files should be audited.</oval:description>
            <oval:reference ref_id="audit_rules_dac_modification_setxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit setxattr" test_ref="oval:ssg-test_32bit_ardm_setxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit augenrules 64-bit setxattr" test_ref="oval:ssg-test_64bit_ardm_setxattr_augenrules:tst:1"/>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit setxattr" test_ref="oval:ssg-test_32bit_ardm_setxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criterion comment="audit auditctl 64-bit setxattr" test_ref="oval:ssg-test_64bit_ardm_setxattr_auditctl:tst:1"/>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_restorecon:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run restorecon</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of restorecon is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_restorecon" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules restorecon" test_ref="oval:ssg-test_audit_rules_execution_restorecon_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl restorecon" test_ref="oval:ssg-test_audit_rules_execution_restorecon_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl restorecon" test_ref="oval:ssg-test_audit_rules_execution_restorecon_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl restorecon" test_ref="oval:ssg-test_audit_rules_execution_restorecon_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_semanage:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run semanage</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of semanage is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_semanage" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules semanage" test_ref="oval:ssg-test_audit_rules_execution_semanage_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl semanage" test_ref="oval:ssg-test_audit_rules_execution_semanage_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl semanage" test_ref="oval:ssg-test_audit_rules_execution_semanage_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl semanage" test_ref="oval:ssg-test_audit_rules_execution_semanage_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_setfiles:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run setfiles</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of setfiles is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_setfiles" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules setfiles" test_ref="oval:ssg-test_audit_rules_execution_setfiles_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl setfiles" test_ref="oval:ssg-test_audit_rules_execution_setfiles_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl setfiles" test_ref="oval:ssg-test_audit_rules_execution_setfiles_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl setfiles" test_ref="oval:ssg-test_audit_rules_execution_setfiles_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_setsebool:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run setsebool</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of setsebool is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_setsebool" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules setsebool" test_ref="oval:ssg-test_audit_rules_execution_setsebool_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl setsebool" test_ref="oval:ssg-test_audit_rules_execution_setsebool_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl setsebool" test_ref="oval:ssg-test_audit_rules_execution_setsebool_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl setsebool" test_ref="oval:ssg-test_audit_rules_execution_setsebool_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_execution_seunshare:def:1" version="1">
          <oval:metadata>
            <oval:title>Record Any Attempts to Run seunshare</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of seunshare is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_execution_seunshare" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules seunshare" test_ref="oval:ssg-test_audit_rules_execution_seunshare_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl seunshare" test_ref="oval:ssg-test_audit_rules_execution_seunshare_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl seunshare" test_ref="oval:ssg-test_audit_rules_execution_seunshare_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl seunshare" test_ref="oval:ssg-test_audit_rules_execution_seunshare_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_login_events_faillock:def:1" version="2">
          <oval:metadata>
            <oval:title>Record Attempts to Alter Login and Logout Events - faillock</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</oval:description>
            <oval:reference ref_id="audit_rules_login_events_faillock" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules faillock" test_ref="oval:ssg-test_arle_faillock_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl faillock" test_ref="oval:ssg-test_arle_faillock_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_login_events_lastlog:def:1" version="2">
          <oval:metadata>
            <oval:title>Record Attempts to Alter Login and Logout Events - lastlog</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</oval:description>
            <oval:reference ref_id="audit_rules_login_events_lastlog" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules lastlog" test_ref="oval:ssg-test_arle_lastlog_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl lastlog" test_ref="oval:ssg-test_arle_lastlog_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_login_events_tallylog:def:1" version="2">
          <oval:metadata>
            <oval:title>Record Attempts to Alter Login and Logout Events - tallylog</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</oval:description>
            <oval:reference ref_id="audit_rules_login_events_tallylog" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules tallylog" test_ref="oval:ssg-test_arle_tallylog_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl tallylog" test_ref="oval:ssg-test_arle_tallylog_auditctl:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_at:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - at</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of at is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_at" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules at" test_ref="oval:ssg-test_audit_rules_privileged_commands_at_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl at" test_ref="oval:ssg-test_audit_rules_privileged_commands_at_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl at" test_ref="oval:ssg-test_audit_rules_privileged_commands_at_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl at" test_ref="oval:ssg-test_audit_rules_privileged_commands_at_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_crontab:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - crontab</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of crontab is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_crontab" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules crontab" test_ref="oval:ssg-test_audit_rules_privileged_commands_crontab_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl crontab" test_ref="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_mount:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - mount</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of mount is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_mount" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules mount" test_ref="oval:ssg-test_audit_rules_privileged_commands_mount_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl mount" test_ref="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl mount" test_ref="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl mount" test_ref="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_newgidmap:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - newgidmap</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of newgidmap is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_newgidmap" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules newgidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgidmap_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl newgidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl newgidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl newgidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_newuidmap:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - newuidmap</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of newuidmap is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_newuidmap" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules newuidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newuidmap_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl newuidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl newuidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl newuidmap" test_ref="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_postdrop:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - postdrop</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of postdrop is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_postdrop" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules postdrop" test_ref="oval:ssg-test_audit_rules_privileged_commands_postdrop_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl postdrop" test_ref="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl postdrop" test_ref="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl postdrop" test_ref="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_postqueue:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - postqueue</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of postqueue is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_postqueue" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules postqueue" test_ref="oval:ssg-test_audit_rules_privileged_commands_postqueue_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl postqueue" test_ref="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl postqueue" test_ref="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl postqueue" test_ref="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_pt_chown:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - pt_chown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of pt_chown is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_pt_chown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules pt_chown" test_ref="oval:ssg-test_audit_rules_privileged_commands_pt_chown_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl pt_chown" test_ref="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl pt_chown" test_ref="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl pt_chown" test_ref="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_umount:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - umount</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of umount is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_umount" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules umount" test_ref="oval:ssg-test_audit_rules_privileged_commands_umount_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl umount" test_ref="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl umount" test_ref="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl umount" test_ref="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_userhelper:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - userhelper</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of userhelper is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_userhelper" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules userhelper" test_ref="oval:ssg-test_audit_rules_privileged_commands_userhelper_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl userhelper" test_ref="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl userhelper" test_ref="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl userhelper" test_ref="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands_usernetctl:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Information on the Use of Privileged Commands - usernetctl</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the information on the use of usernetctl is enabled.</oval:description>
            <oval:reference ref_id="audit_rules_privileged_commands_usernetctl" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules usernetctl" test_ref="oval:ssg-test_audit_rules_privileged_commands_usernetctl_augenrules:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl usernetctl" test_ref="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl:tst:1"/>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="SLE12 OS installed" definition_ref="oval:ssg-installed_OS_is_sle12:def:1"/>
              <oval:criterion comment="audit auditctl usernetctl" test_ref="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_audit_rules:tst:1"/>
              <oval:criterion comment="audit auditctl usernetctl" test_ref="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_rules_d:tst:1"/>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_chmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - chmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_chmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_chmod_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_chmod_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_chmod_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_chmod_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_chmod_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_chmod_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_chmod_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_chmod_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_chown:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - chown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_chown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_chown_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_chown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_chown_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_chown_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_chown_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_chown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_chown_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_chown_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_creat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - creat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_creat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_creat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_creat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_creat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_creat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_creat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_creat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_creat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_creat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fchmod:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fchmod</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fchmod" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchmod_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchmod_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchmod_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchmod_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchmod_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchmod_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchmod_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchmod_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fchmodat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fchmodat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fchmodat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchmodat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchmodat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchmodat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchmodat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchmodat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchmodat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchmodat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchmodat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fchown:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fchown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fchown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchown_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchown_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchown_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchown_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchown_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchown_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fchownat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fchownat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fchownat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchownat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchownat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchownat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchownat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fchownat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fchownat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fchownat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fchownat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fremovexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fremovexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fremovexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fremovexattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fremovexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fremovexattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fremovexattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fremovexattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fremovexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fremovexattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fremovexattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_fsetxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - fsetxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_fsetxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fsetxattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fsetxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fsetxattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fsetxattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_fsetxattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_fsetxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_fsetxattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_fsetxattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_ftruncate:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - ftruncate</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_ftruncate" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_ftruncate_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_ftruncate_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_ftruncate_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_ftruncate_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_ftruncate_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_ftruncate_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_ftruncate_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_ftruncate_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_lchown:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - lchown</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_lchown" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lchown_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lchown_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lchown_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lchown_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lchown_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lchown_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lchown_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lchown_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_lremovexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - lremovexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_lremovexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lremovexattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lremovexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lremovexattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lremovexattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lremovexattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lremovexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lremovexattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lremovexattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_lsetxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - lsetxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_lsetxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lsetxattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lsetxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lsetxattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lsetxattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_lsetxattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_lsetxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_lsetxattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_lsetxattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_open:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - open</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_open" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_open_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_open_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_open_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_open_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_open_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_open_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_open_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_open_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - open_by_handle_at</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_open_by_handle_at" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_open_by_handle_at_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_open_by_handle_at_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_open_by_handle_at_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_open_by_handle_at_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_open_by_handle_at_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_open_by_handle_at_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_open_by_handle_at_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_open_by_handle_at_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_openat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - openat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_openat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_openat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_openat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_openat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_openat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_openat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_openat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_openat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_openat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_removexattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - removexattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_removexattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_removexattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_removexattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_removexattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_removexattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_removexattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_removexattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_removexattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_removexattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_rename:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - rename</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_rename" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_rename_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_rename_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_rename_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_rename_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_rename_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_rename_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_rename_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_rename_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_renameat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - renameat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_renameat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_renameat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_renameat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_renameat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_renameat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_renameat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_renameat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_renameat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_renameat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_setxattr:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - setxattr</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_setxattr" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_setxattr_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_setxattr_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_setxattr_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_setxattr_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_setxattr_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_setxattr_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_setxattr_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_setxattr_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_truncate:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - truncate</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_truncate" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_truncate_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_truncate_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_truncate_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_truncate_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_truncate_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_truncate_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_truncate_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_truncate_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_unlink:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - unlink</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_unlink" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_unlink_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_unlink_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_unlink_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_unlink_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_unlink_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_unlink_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_unlink_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_unlink_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification_unlinkat:def:1" version="1">
          <oval:metadata>
            <oval:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful) - unlinkat</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>Audit rules about the unauthorized access attempts to files (unsuccessful) are enabled.</oval:description>
            <oval:reference ref_id="audit_rules_unsuccessful_file_modification_unlinkat" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="OR">
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit augenrules" definition_ref="oval:ssg-audit_rules_augenrules:def:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_unlinkat_augenrules:tst:1"/>
              <oval:criterion comment="audit augenrules 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_unlinkat_augenrules:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit augenrules 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_unlinkat_augenrules:tst:1"/>
                  <oval:criterion comment="audit augenrules 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_unlinkat_augenrules:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
            <oval:criteria operator="AND">
              <oval:extend_definition comment="audit auditctl" definition_ref="oval:ssg-audit_rules_auditctl:def:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eacces" test_ref="oval:ssg-test_32bit_arufm_eacces_unlinkat_auditctl:tst:1"/>
              <oval:criterion comment="audit auditctl 32-bit file eperm" test_ref="oval:ssg-test_32bit_arufm_eperm_unlinkat_auditctl:tst:1"/>
              <oval:criteria operator="OR">
                <oval:extend_definition comment="64-bit_system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true"/>
                <oval:criteria operator="AND">
                  <oval:criterion comment="audit auditctl 64-bit file eacces" test_ref="oval:ssg-test_64bit_arufm_eacces_unlinkat_auditctl:tst:1"/>
                  <oval:criterion comment="audit auditctl 64-bit file eperm" test_ref="oval:ssg-test_64bit_arufm_eperm_unlinkat_auditctl:tst:1"/>
                </oval:criteria>
              </oval:criteria>
            </oval:criteria>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_nodev_remote_filesystems:def:1" version="1">
          <oval:metadata>
            <oval:title>Mount Remote Filesystems with nodev</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nodev option should be enabled for all NFS mounts in /etc/fstab.</oval:description>
            <oval:reference ref_id="mount_option_nodev_remote_filesystems" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="XOR">
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1"/>
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nodev_etc_fstab:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_noexec_remote_filesystems:def:1" version="1">
          <oval:metadata>
            <oval:title>Mount Remote Filesystems with noexec</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The noexec option should be enabled for all NFS mounts in /etc/fstab.</oval:description>
            <oval:reference ref_id="mount_option_noexec_remote_filesystems" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="XOR">
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_noexec:tst:1"/>
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_noexec_etc_fstab:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-mount_option_nosuid_remote_filesystems:def:1" version="1">
          <oval:metadata>
            <oval:title>Mount Remote Filesystems with nosuid</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The nosuid option should be enabled for all NFS mounts in /etc/fstab.</oval:description>
            <oval:reference ref_id="mount_option_nosuid_remote_filesystems" source="ssg"/>
          </oval:metadata>
          <oval:criteria operator="XOR">
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1"/>
            <oval:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_nss-pam-ldapd_removed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package nss-pam-ldapd Removed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package nss-pam-ldapd should be removed.</oval:description>
            <oval:reference ref_id="package_nss-pam-ldapd_removed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package nss-pam-ldapd is removed" test_ref="oval:ssg-test_package_nss-pam-ldapd_removed:tst:1"/>
          </oval:criteria>
        </oval:definition>
        <oval:definition class="compliance" id="oval:ssg-package_samba-common_installed:def:1" version="1">
          <oval:metadata>
            <oval:title>Package samba-common Installed</oval:title>
            <oval:affected family="unix">
              <oval:platform>SUSE Linux Enterprise 12</oval:platform>
            </oval:affected>
            <oval:description>The RPM package samba-common should be installed.</oval:description>
            <oval:reference ref_id="package_samba-common_installed" source="ssg"/>
          </oval:metadata>
          <oval:criteria>
            <oval:criterion comment="package samba-common is installed" test_ref="oval:ssg-test_package_samba-common_installed:tst:1"/>
          </oval:criteria>
        </oval:definition>
      </oval:definitions>
      <oval:tests>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Banner for FTP Users" id="oval:ssg-test_ftp_present_banner:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_test_ftp_present_banner:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="Check if root has the correct mail alias." id="oval:ssg-test_postfix_client_configure_mail_alias:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_root_mail_alias:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_root_mail_alias:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the insecure locks in /etc/exports" id="oval:ssg-test_no_insecure_locks_exports:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_no_insecure_locks_exports:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check if maxpoll is set in /etc/ntp.conf" id="oval:ssg-test_ntp_set_maxpoll:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ntp_set_maxpoll:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_time_service_set_maxpoll:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check if maxpoll is set in /etc/chrony.conf" id="oval:ssg-test_chrony_set_maxpoll:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_chrony_set_maxpoll:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_time_service_set_maxpoll:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check if all server entries have maxpoll set in /etc/ntp.conf" id="oval:ssg-test_ntp_all_server_has_maxpoll:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ntp_all_server_has_maxpoll:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_server_has_maxpoll:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check if all server entries have maxpoll set in /etc/chrony.conf" id="oval:ssg-test_chrony_all_server_has_maxpoll:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_chrony_all_server_has_maxpoll:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_server_has_maxpoll:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="look for shosts.equiv in /" id="oval:ssg-test_no_shosts_equiv:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_no_shosts_equiv_files_root:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="look for .shosts in /" id="oval:ssg-test_no_shosts:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_no_shosts_files_root:obj:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/fstab" id="oval:ssg-test_20340111:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_20340111:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" id="oval:ssg-test_20340112:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_20340111:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_20340112:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/mtab" id="oval:ssg-test_20340113:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_20340112:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" id="oval:ssg-test_20340114:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_20340112:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_20340112:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_default_communities:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_snmp_default_communities:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_versions:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_snmp_versions:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="sshd HostbasedAuthentication" id="oval:ssg-test_sshd_hostbasedauthentication:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_hostbasedauthentication:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of Compression setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_compression:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_disable_compression:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitEmptyPasswords[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitemptypasswords_no:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the RhostsRSAAuthentication[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitRootLogin[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitrootlogin_no:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_permitrootlogin_no:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the IgnoreUserKnownHosts[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_user_known_hosts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Check value of PermitUserEnvironment in /etc/ssh/sshd_config" id="oval:ssg-test_sshd_no_user_envset:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_no_user_envset:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of StrictModes setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_enable_strictmodes:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_enable_strictmodes:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the Banner[\s]+/etc/issue setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_banner_set:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_banner_set:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of X11Forwarding setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_enable_x11_forwarding:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_enable_x11_forwarding:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of PrintLastLog setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_enable_printlastlog:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_enable_printlastlog:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="timeout is configured" id="oval:ssg-test_sshd_idle_timeout:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_idle_timeout:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_timeout_value_upper_bound:ste:1"/>
          <ns3:state state_ref="oval:ssg-state_timeout_value_lower_bound:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ClientAliveCountMax setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_clientalivecountmax:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_clientalivecountmax:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sshd_clientalivecountmax:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="loglevel is set" id="oval:ssg-test_sshd_set_loglevel_info:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_set_loglevel_info:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="maxauthtries is configured" id="oval:ssg-test_sshd_max_auth_tries:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_max_auth_tries:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_maxauthtries_value_upper_bound:ste:1"/>
          <ns3:state state_ref="oval:ssg-state_maxauthtries_value_lower_bound:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of Ciphers setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_ciphers:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_use_approved_ciphers:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="at least one" comment="tests the value of MACs setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_macs:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_use_approved_macs:obj:1"/>
          <ns3:state state_ref="oval:ssg-ste_sshd_use_approved_macs:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of UsePrivilegeSeparation setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_priv_separation:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_use_priv_separation:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sshd_use_priv_separation:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="loglevel is set" id="oval:ssg-test_sshd_set_loglevel_verbose:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sshd_set_loglevel_verbose:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of memcache_timeout setting in the /etc/sssd/sssd.conf file" id="oval:ssg-test_sssd_memcache_timeout:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sssd_memcache_timeout:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sssd_memcache_timeout:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of offline_credentials_expiration setting in the /etc/sssd/sssd.conf file" id="oval:ssg-test_sssd_offline_cred_expiration:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sssd_offline_cred_expiration:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/issue" id="oval:ssg-test_banner_etc_issue:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_banner_etc_issue:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/motd" id="oval:ssg-test_banner_etc_motd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_banner_etc_motd:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="GUI banner is enabled" id="oval:ssg-test_banner_gui_enabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_banner_gui_enabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="GUI banner cannot be changed by user" id="oval:ssg-test_prevent_user_banner_gui_enabled_change:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_prevent_user_banner_gui_enabled_change:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="GUI banner cannot be changed by user" id="oval:ssg-test_prevent_user_banner_change:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_prevent_user_banner_change:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="login banner text is correctly set" id="oval:ssg-test_gdm_login_banner_text_setting:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_gdm_login_banner_text_setting:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_gdm_login_banner_text_setting:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/gdm/Xsession world executable and owned by root" id="oval:ssg-test_banner_gui_acknowledgement_exec:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_banner_gui_acknowledgement_file:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_banner_gui_acknowledgement_file:ste:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="GUI Banner acknowledgement is active" id="oval:ssg-test_banner_gui_acknowledgement:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_banner_gui_acknowledgement:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/gdm/banner" id="oval:ssg-test_banner_etc_gdm_banner:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_banner_etc_gdm_banner:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/gdm/banner read permissions" id="oval:ssg-test_banner_etc_gdm_banner_readable:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_banner_etc_gdm_banner_readable:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_banner_etc_gdm_banner_readable:ste:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" comment="Check the pam_lastlog configuration" id="oval:ssg-test_display_login_attempts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_display_login_attempts:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="Forbid 'silent' option for pam_lastlog" id="oval:ssg-test_display_login_attempts_silent:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_display_login_attempts_silent:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="Check the pam_faildelay configuration" id="oval:ssg-test_faildelay:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_faildelay:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_faildelay:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/pam.d/common-* are not symbolic links" id="oval:ssg-test_pam_disable_automatic_configuration:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_pam_disable_automatic_configuration:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_pam_disable_automatic_configuration_no_symlink:ste:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if use_authtok attribute of pam_pwhistory.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_pwhistory_use_authtok:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_password_pam_pwhistory_use_authtok:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if remember attribute of pam_pwhistory.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_accounts_password_pam_pwhistory_remember:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks if pam_faillock authfail is hit even if pam_unix skips lines by defaulting, and also authfail deny value" id="oval:ssg-test_accounts_passwords_pam_faillock_numeric_default_check_system-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_when_lines_skipped_system-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks if pam_faillock authfail is hit even if pam_unix skips lines by defaulting, and also authfail deny value" id="oval:ssg-test_accounts_passwords_pam_faillock_numeric_default_check_password-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_when_lines_skipped_password-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present, with correct deny value, and is followed by pam_unix." id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check control values of pam_unix, that it is followed by pam_faillock.so authfail and deny value of pam_faillock.so authfail" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock.so is called in account phase before pam_unix" id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present in /etc/pam.d/password-auth, has correct deny value, and is followed by pam_unix" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock authfail is present after pam_unix, check pam_unix has proper control values, and authfail deny value is correct." id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock_so is called in account phase before pam_unix." id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify deny configuation of pam_tally2" id="oval:ssg-test_accounts_passwords_pam_tally2_deny_auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_tally2_deny_auth:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify deny configuation of pam_tally2_account" id="oval:ssg-test_accounts_passwords_pam_tally2_deny_account:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_passwords_pam_tally2_deny_account:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify dcredit configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_dcredit:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_dcredit:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify difok configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_difok:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_difok:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_difok:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify lcredit configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_lcredit:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_lcredit:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify minlen configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_minlen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_minlen_line:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_minlen:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify ocredit configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_ocredit:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_ocredit:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify ucredit configuation of pam_cracklib" id="oval:ssg-test_cracklib_accounts_password_pam_ucredit:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cracklib_accounts_password_pam_ucredit:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" comment="The value of ENCRYPT_METHOD should be set appropriately in /etc/login.defs" id="oval:ssg-test_etc_login_defs_encrypt_method:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_encrypt_method_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_encrypt_method_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-test_pam_unix_sha512:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_pam_unix_sha512:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" comment="The value of SHA_CRYPT_MIN_ROUNDS should be set appropriately in /etc/login.defs" id="oval:ssg-test_etc_login_defs_sha_crypt_min_rounds:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_sha_crypt_min_rounds_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_sha_crypt_rounds_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" check_existence="any_exist" comment="The value of SHA_CRYPT_MAX_ROUNDS should be set appropriately in /etc/login.defs" id="oval:ssg-test_etc_login_defs_sha_crypt_max_rounds:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_sha_crypt_max_rounds_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_sha_crypt_rounds_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" comment="The value of SHA_CRYPT_MAX_ROUNDS or SHA_CRYPT_MIN_ROUNDS is set in /etc/login.defs" id="oval:ssg-test_etc_login_defs_sha_crypt_min_or_max_rounds:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_sha_crypt_min_or_max_rounds_instance_value:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/common-auth for correct settings" id="oval:ssg-test_pam_unix_sha512_auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_pam_unix_sha512_auth:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:symlink_test check="all" check_existence="all_exist" comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_disable_ctrlaltdel_exists:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_disable_ctrlaltdel_exists:ste:1"/>
        </ns4:symlink_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Test ocsp_on in /etc/pam_pkcs11/pkcs11.conf" id="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is required in /etc/pam.d/common-auth file" id="oval:ssg-test_smart_card_common_auth:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_smart_card_common_auth:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Test ca in /etc/pam_pkcs11/pkcs11.conf" id="oval:ssg-test_pam_pkcs11_cert_policy_ca:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_pam_pkcs11_cert_policy_ca:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_pam_pkcs11_cert_policy_ca:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="There should not exist duplicate user ids in /etc/passwd" id="oval:ssg-test_etc_passwd_no_duplicate_user_ids:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_count_of_all_uids:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_no_duplicate_uids:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd" id="oval:ssg-test_etc_default_useradd_inactive:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_etc_default_useradd_inactive:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_etc_default_useradd_inactive:ste:1"/>
          <ns3:state state_ref="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="There should not exist duplicate user name entries in /etc/passwd" id="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1"/>
        </ns3:variable_test>
        <ns4:shadow_test check="all" check_existence="none_exist" comment="user passwords have minimum lifetime" id="oval:ssg-test_account_passwords_minimum_lifetime:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_account_passwords_minimum_lifetime:obj:1"/>
        </ns4:shadow_test>
        <ns4:shadow_test check="all" check_existence="all_exist" comment="user passwords have maximum lifetime" id="oval:ssg-test_account_passwords_maximum_lifetime:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_account_passwords_maximum_lifetime:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_account_passwords_maximum_lifetime:ste:1"/>
        </ns4:shadow_test>
        <ns3:variable_test check="all" comment="The value of PASS_MAX_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_max_days:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_pass_max_days_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_pass_max_days_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_days:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_pass_min_days_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_pass_min_days_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" comment="The value of PASS_MIN_LEN should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_len:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_pass_min_len_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_pass_min_len_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" comment="The value of PASS_WARN_AGE should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_warn_age:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_pass_warn_age_instance_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_last_pass_warn_age_instance_value:ste:1"/>
        </ns3:variable_test>
        <ns4:password_test check="all" comment="password hashes are shadowed" id="oval:ssg-test_accounts_password_all_shadowed:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_accounts_password_all_shadowed:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_accounts_password_all_shadowed:ste:1"/>
        </ns4:password_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="make sure nullok is not used in PAM configuration" id="oval:ssg-test_no_empty_passwords:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_empty_passwords:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="at_least_one_exists" comment="look for .netrc in /home" id="oval:ssg-test_no_netrc_files_home:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_no_netrc_files_home:obj:1"/>
        </ns4:file_test>
        <ns4:shadow_test check="all" check_existence="none_exist" comment="password hashes are shadowed using sha512" id="oval:ssg-test_accounts_password_all_shadowed_sha512:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_accounts_password_all_shadowed_sha512:obj:1"/>
        </ns4:shadow_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="test that there are no accounts with UID 0 except root in the /etc/passwd file" id="oval:ssg-test_accounts_no_uid_except_root:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_no_uid_except_root:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="/etc/securetty file exists" id="oval:ssg-test_etc_securetty_exists:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_etc_securetty_exists:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="no entries in /etc/securetty" id="oval:ssg-test_no_direct_root_logins:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_direct_root_logins:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="&lt;0, UID_MIN - 1&gt; system UIDs having shell set" id="oval:ssg-test_shell_defined_default_uid_range:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_shell_defined_default_uid_range:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_shell_defined_default_uid_range:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MIN not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_min_not_defined:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MAX not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_max_not_defined:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="&lt;0, SYS_UID_MIN&gt; system UIDs having shell set" id="oval:ssg-test_shell_defined_reserved_uid_range:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_shell_defined_reserved_uid_range:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_shell_defined_reserved_uid_range:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="&lt;SYS_UID_MIN, SYS_UID_MAX&gt; system UIDS having shell set" id="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="serial ports /etc/securetty" id="oval:ssg-test_serial_ports_etc_securetty:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_serial_ports_etc_securetty:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="virtual consoles /etc/securetty" id="oval:ssg-test_virtual_consoles_etc_securetty:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_virtual_consoles_etc_securetty:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Check value of CREATE_HOME in /etc/login.defs" id="oval:ssg-test_accounts_have_homedir_login_defs:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_accounts_have_homedir_login_defs:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check FAIL_DELAY in /etc/login.defs" id="oval:ssg-test_accounts_logon_fail_delay:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_logon_fail_delay:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_accounts_logon_fail_delay:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" id="oval:ssg-test_maxlogins:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_maxlogins:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_maxlogins:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins_exists:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile" id="oval:ssg-test_etc_profile_tmout:tst:1" version="2">
          <ns3:object object_ref="oval:ssg-object_etc_profile_tmout:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile.d/*.sh" id="oval:ssg-test_etc_profiled_tmout:tst:1" version="2">
          <ns3:object object_ref="oval:ssg-object_etc_profiled_tmout:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns4:password_test check="all" comment="all interactive users have home directories defined" id="oval:ssg-test_accounts_user_interactive_home_directory_defined:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_user_interactive_home_defined_passwd_list:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_user_interactive_home_defined_has_home_dir:ste:1"/>
        </ns4:password_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="Check user ids on all files on the system" id="oval:ssg-test_user_interactive_home_exists:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_user_interactive_home_exists_home_directory_list:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_user_interactive_home_exists_each_home_has_file_object:ste:1"/>
        </ns3:variable_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check permissions of hidden files in home directory of interactive users" id="oval:ssg-test_file_permissions_user_init_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_file_permissions_user_init_files_file_object_list:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_user_init_files_group_permissions:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_user_init_files_other_permissions:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check home directory permissions of interactive users" id="oval:ssg-test_file_permissions_home_directories:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_file_permissions_home_directories_file_object_list:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_home_directories_group_permissions:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_home_directories_other_permissions:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="at_least_one_exists" comment="home directories" id="oval:ssg-test_file_permissions_home_dirs:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_home_dirs:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_home_dirs_wrong_perm:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="Check if there aren't directories in root's path having write permission set for group or other" id="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1"/>
        </ns4:file_test>
        <ns3:variable_test check="all" comment="Test the retrieved /etc/login.defs umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1"/>
          <ns3:state state_ref="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group_augen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group_augen:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_augen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_augen:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_augen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_augen:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_augen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_augen:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_augen:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_augen:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group_augen_group:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group_augen_group:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group_auditctl_group:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group_auditctl_group:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_augen_gshadow:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_augen_gshadow:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow_auditctl_gshadow:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_auditctl_gshadow:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_augen_opasswd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_augen_opasswd:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd_auditctl_opasswd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_auditctl_opasswd:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_augen_passwd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_augen_passwd:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd_auditctl_passwd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_auditctl_passwd:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_augen_shadow:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_augen_shadow:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow_auditctl_shadow:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_auditctl_shadow:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_ownership_var_log_audit_directories:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_ownership_var_log_audit_files:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="checks for an audit rule for every suid binary" id="oval:ssg-test_audit_rules_suid_privilege_function:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_suid_binaries:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_has_audit_rule_audit_rules:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_has_audit_rule_rules_d:ste:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check that no audit rule exists in /etc/audit/rules.d/*.rules that disables all syscall auditing" id="oval:ssg-test_enable_syscall_audit_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_enable_syscall_audit_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check that no audit rule exists in /etc/audit/audit.rules that disables all syscall auditing" id="oval:ssg-test_enable_syscall_audit_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_enable_syscall_audit_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit delete_module" id="oval:ssg-test_32bit_ardm_delete_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_delete_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit delete_module" id="oval:ssg-test_64bit_ardm_delete_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_delete_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit delete_module" id="oval:ssg-test_32bit_ardm_delete_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_delete_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit delete_module" id="oval:ssg-test_64bit_ardm_delete_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_delete_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit finit_module" id="oval:ssg-test_32bit_ardm_finit_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_finit_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit finit_module" id="oval:ssg-test_64bit_ardm_finit_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_finit_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit finit_module" id="oval:ssg-test_32bit_ardm_finit_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_finit_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit finit_module" id="oval:ssg-test_64bit_ardm_finit_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_finit_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit init_module" id="oval:ssg-test_32bit_ardm_init_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_init_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit init_module" id="oval:ssg-test_64bit_ardm_init_module_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_init_module_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit init_module" id="oval:ssg-test_32bit_ardm_init_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_init_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit init_module" id="oval:ssg-test_64bit_ardm_init_module_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_init_module_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="remote server to send audit records" id="oval:ssg-test_auditd_audispd_configure_remote_server:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_audispd_configure_remote_server:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_audispd_configure_remote_server:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="remote server to send audit records" id="oval:ssg-test_auditd_audispd_configure_disk_full_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_audispd_configure_disk_full_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_audispd_configure_disk_full_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="setting in audisp-remote.conf" id="oval:ssg-test_auditd_audispd_encrypt_sent_records:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_audispd_encrypt_sent_records:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="remote server to send audit records" id="oval:ssg-test_auditd_audispd_configure_network_failure_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_audispd_configure_network_failure_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_audispd_configure_network_failure_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audispd syslog plugin activated" id="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="disk full action" id="oval:ssg-test_auditd_data_disk_error_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_disk_error_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_disk_error_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="disk error action" id="oval:ssg-test_auditd_data_disk_full_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_disk_full_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_disk_full_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="email account for actions" id="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="max log file size" id="oval:ssg-test_auditd_data_retention_max_log_file:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_num_logs:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_num_logs:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_num_logs:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_space_left:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_space_left:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_space_left:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_space_left_action:tst:1" version="2">
          <ns3:object object_ref="oval:ssg-object_auditd_data_retention_space_left_action:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_auditd_data_retention_space_left_action:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check for iommu=force in /etc/default/grub via GRUB_CMDLINE_LINUX" id="oval:ssg-test_grub2_enable_force_iommu:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_enable_force_iommu:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_grub2_enable_force_iommu:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check for fips=1 in /etc/default/grub via GRUB_CMDLINE_LINUX_DEFAULT" id="oval:ssg-test_grub2_enable_force_iommu_default:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_enable_force_iommu_default:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_grub2_enable_force_iommu:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="superuser is defined in /boot/grub2/grub.cfg files. Superuser is not root, admin, or administrator" id="oval:ssg-test_bootloader_superuser:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_bootloader_superuser:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /boot/grub2/user.cfg" id="oval:ssg-test_grub2_password_usercfg:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_password_usercfg:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /boot/grub2/grub.cfg" id="oval:ssg-test_grub2_password_grubcfg:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_password_grubcfg:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/sys/firmware/efi exists" id="oval:ssg-test_bootloader_uefi_used:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_bootloader_uefi_used:obj:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="superuser is defined in /boot/efi/EFI/redhat/grub.cfg. Superuser is not root, admin, or administrator" id="oval:ssg-test_bootloader_uefi_superuser:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_bootloader_uefi_superuser:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /boot/efi/EFI/redhat/user.cfg" id="oval:ssg-test_grub2_uefi_password_usercfg:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_uefi_password_usercfg:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /boot/efi/EFI/*/grub.cfg" id="oval:ssg-test_grub2_uefi_password_grubcfg:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_uefi_password_grubcfg:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system RTC configured is using UTC" id="oval:ssg-test_ensure_rtc_utc_configuration:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_rtc_utc_configuration:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the presence of daily setting in /etc/logrotate.conf file" id="oval:ssg-test_logrotate_conf_daily_setting:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_logrotate_conf_daily_setting:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the existence of /etc/cron.daily/logrotate file (and verify it actually calls logrotate utility)" id="oval:ssg-test_cron_daily_logrotate_existence:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_cron_daily_logrotate_existence:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_conf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_remote_loghost_rsyslog_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:interface_test check="all" check_existence="at_least_one_exists" comment="check all network interfaces for PROMISC flag" id="oval:ssg-test_promisc_interfaces:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_promisc_interfaces:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_promisc:ste:1"/>
        </ns4:interface_test>
        <ns3:textfilecontent54_test check="all" comment="ipv6 disabled any modprobe conf file" id="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="query /proc/net/wireless" id="oval:ssg-test_wireless_disable_interfaces:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_wireless_disable_interfaces:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="DoS protection is configured" id="oval:ssg-test_susefirewall2_ddos_protection:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_susefirewall2_ddos_protection:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_susefirewall2_ddos_protection_hitcount:ste:1"/>
          <ns3:state state_ref="oval:ssg-state_susefirewall2_ddos_protection_blockseconds:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="all local world-writable directories have sticky bit set" id="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_only_local_directories:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_world_writable_and_not_sticky:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="system.map files readable only by root" id="oval:ssg-test_permissions_systemmap_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_systemmap_files:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_owner_systemmap:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_systemmap:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="none_exist" comment="files with no group owner" id="oval:ssg-test_file_permissions_ungroupowned:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_ungroupowned:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="at_least_one_exists" comment="Check user ids on all files on the system" id="oval:ssg-no_files_unowned_by_user_test:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-file_permissions_unowned_object:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" comment="check for local directories that are world writable and have gid greater than or equal to 1000" id="oval:ssg-test_dir_world_writable_gid_gt_value:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-all_local_directories:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_gid_is_interactive:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/security/opasswd is owned by root:root / 0600" id="oval:ssg-test_file_etc_security_opasswd:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_etc_security_opasswd:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_etc_security_opasswd:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_file_group_etc_security_opasswd:ste:1"/>
        </ns4:file_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nodev on local filesystems" id="oval:ssg-test_nodev_nonroot_local_partitions:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_non_root_partitions:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_local_nodev:ste:1"/>
        </ns5:partition_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure /var/tmp is configured to bind mount to /tmp" id="oval:ssg-test_configure_mount_option_var_tmp_bind_tmp:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_configure_mount_option_var_tmp_bind_tmp:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:partition_test check="all" comment="Ensure /var/tmp is mounted" id="oval:ssg-test_mount_option_var_tmp:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_mount_option_var_tmp:obj:1"/>
        </ns5:partition_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure bind mount option is on /var/tmp" id="oval:ssg-test_mount_option_var_tmp_bind:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_mount_option_var_tmp_bind:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:partition_test check="all" comment="Ensure /var/tmp and /tmp have the same source device" id="oval:ssg-test_mount_option_var_tmp_bind_compare_source:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_mount_option_var_tmp_bind_compare_source:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_mount_option_var_tmp_bind_compare_source:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="any_exist" comment="all nfs file systems must be mounted with 'nosuid'" id="oval:ssg-test_nfs_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_nfs_nosuid_mount_points:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_nfs_nosuid_without_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="any_exist" comment="all nfs file systems must be mounted with 'noexec'" id="oval:ssg-test_nfs_noexec:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_nfs_noexec_mount_points:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_nfs_noexec_without_noexec:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="all file systems that contain a home directory must be mounted with 'nosuid'" id="oval:ssg-test_home_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_home_nosuid_mount_points:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_home_nosuid_has_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="system.map files readable only by root" id="oval:ssg-test_permissions_var_log_messages_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_var_log_messages_files:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_owner_var_log_messages:ste:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_var_log_messages:ste:1"/>
        </ns4:file_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="Check user ids on all files on the system" id="oval:ssg-test_partition_home_dirs:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_user_interactive_home_parent_dirs:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_user_interactive_home_partition_exists_each_home_parent_has_partition:ste:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="dconf user profile exists" id="oval:ssg-test_dconf_user_profile:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_dconf_user_profile:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check the text backend config directive" id="oval:ssg-test_dconf_backend_directive:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_dconf_backend_config:obj:1"/>
          <ns3:state state_ref="oval:ssg-obj_dconf_backend_first_line:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable GDM Automatic Login" id="oval:ssg-test_disable_automatic_login:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_disable_automatic_login:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable Ctrl-Alt-Del" id="oval:ssg-test_disable_gnome_ctrlaltdel:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_disable_gnome_ctrlaltdel:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="Prevent enabling of ctrl-alt-del keys" id="oval:ssg-test_prevent_user_enable_ctrlaltdel:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_prevent_user_enable_ctrlaltdel:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="AntiVirus package is installed" id="oval:ssg-test_linuxshield_install_antivirus:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_linuxshield_install_antivirus:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="Runtime Libraries package is installed" id="oval:ssg-test_mcafee_runtime_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_mcafee_runtime_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="Agent package is installed" id="oval:ssg-test_mcafee_management_agent:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_mcafee_management_agent:obj:1"/>
        </ns5:rpminfo_test>
        <ns3:variable_test check="all" check_existence="all_exist" comment="McAfee AntiVirus definitions have been updated" id="oval:ssg-test_mcafee_antivirus_definitions_updated:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_mcafee_definitions_modified_time:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_mcafee_definitions_max_age:ste:1"/>
        </ns3:variable_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="McAfee ACCM installed" id="oval:ssg-test_mcafee_accm_exists:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_mcafee_accm_exists:obj:1"/>
        </ns4:file_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="McAfee IPS is installed" id="oval:ssg-test_mcafee_hbss_hips_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="McAfee Policy Auditor installed" id="oval:ssg-test_mcafee_auditengine_exists:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_mcafee_auditengine_exists:obj:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="add_dracutmodules contains fips" id="oval:ssg-test_enable_dracut_fips_module:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_enable_dracut_fips_module:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_enable_dracut_fips_module:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:variable_test check="at least one" comment="tests if var_system_crypto_policy is set to FIPS" id="oval:ssg-test_system_crypto_policy_value:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_system_crypto_policy_value:obj:1"/>
          <ns3:state state_ref="oval:ssg-ste_system_crypto_policy_value:ste:1"/>
        </ns3:variable_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter crypto.fips_enabled set to 1" id="oval:ssg-test_sysctl_crypto_fips_enabled:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_crypto_fips_enabled:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_crypto_fips_enabled:ste:1"/>
        </ns4:sysctl_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide with cron" id="oval:ssg-test_aide_periodic_cron_checking:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_test_aide_periodic_cron_checking:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide with cron" id="oval:ssg-test_aide_crond_checking:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_test_aide_crond_checking:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide with cron" id="oval:ssg-test_aide_var_cron_checking:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_var_cron_checking:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide with cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_checking:tst:1" version="2">
          <ns3:object object_ref="oval:ssg-object_aide_crontabs_checking:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_scan_notification:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_test_aide_scan_notification:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_var_cron_notification:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_var_cron_notification:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes in cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_notification:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_crontabs_notification:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="any_exist" comment="acl is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_acls:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_acls:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_verify_acls:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="xattrs is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_ext_attributes:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_ext_attributes:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_verify_ext_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="auditctl is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_auditctl:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="auditd is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_auditd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_auditd:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="ausearch is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_ausearch:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_ausearch:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="aureport is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_aureport:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_aureport:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="autrace is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_autrace:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_autrace:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audispd is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_audispd:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_audispd:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="augenrules is checked in /etc/aide.conf" id="oval:ssg-test_aide_verify_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_aide_verify_augenrules:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_aide_check_attributes:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="any_exist" comment="query /etc/passwd" id="oval:ssg-test_accounts_authorized_local_users:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_accounts_authorized_local_users:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_accounts_authorized_local_users:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="!authenticate does not exist in /etc/sudoers" id="oval:ssg-test_no_authenticate_etc_sudoers:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_authenticate_etc_sudoers:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="!authenticate does not exist in /etc/sudoers.d" id="oval:ssg-test_no_authenticate_etc_sudoers_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_authenticate_etc_sudoers_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="NOPASSWD does not exist /etc/sudoers" id="oval:ssg-test_nopasswd_etc_sudoers:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_nopasswd_etc_sudoers:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="NOPASSWD does not exist in /etc/sudoers.d" id="oval:ssg-test_nopasswd_etc_sudoers_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_nopasswd_etc_sudoers_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of solver.upgradeRemoveDroppedPackages in /etc/zypp/zypp.conf" id="oval:ssg-test_zypp_clean_components_post_updating:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_zypp_clean_components_post_updating:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check value of gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_gpgcheck_globally_unset:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_gpgcheck_globally_unset:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_gpgcheck_globally_activated:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_gpgcheck_globally_activated:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check value of repo_gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_repo_gpgcheck_globally_unset:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_repo_gpgcheck_globally_unset:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of repo_gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_repo_gpgcheck_globally_activated:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_repo_gpgcheck_globally_activated:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="check value of pkg_gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_pkg_gpgcheck_globally_unset:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_pkg_gpgcheck_globally_unset:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of pkg_gpgcheck in /etc/zypp/zypp.conf" id="oval:ssg-test_ensure_pkg_gpgcheck_globally_activated:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_ensure_pkg_gpgcheck_globally_activated:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check for blacklist of usb-storage" id="oval:ssg-test_blacklist_d_usb-storage:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_blacklist_d_usb-storage:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check for blacklist of usb-storage" id="oval:ssg-test_blacklist_f_usb-storage:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_blacklist_f_usb-storage:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit mount" id="oval:ssg-test_32bit_ardm_mount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_mount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit mount" id="oval:ssg-test_64bit_ardm_mount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_mount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit mount" id="oval:ssg-test_32bit_ardm_mount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_mount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit mount" id="oval:ssg-test_64bit_ardm_mount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_mount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit umount" id="oval:ssg-test_32bit_ardm_umount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_umount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit umount" id="oval:ssg-test_64bit_ardm_umount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_umount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit umount" id="oval:ssg-test_32bit_ardm_umount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_umount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit umount" id="oval:ssg-test_64bit_ardm_umount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_umount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit umount2" id="oval:ssg-test_32bit_ardm_umount2_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_umount2_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit umount2" id="oval:ssg-test_64bit_ardm_umount2_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_umount2_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit umount2" id="oval:ssg-test_32bit_ardm_umount2_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_umount2_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit umount2" id="oval:ssg-test_64bit_ardm_umount2_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_umount2_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chacl" id="oval:ssg-test_audit_rules_execution_chacl_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chacl_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chacl" id="oval:ssg-test_audit_rules_execution_chacl_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chacl_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chacl" id="oval:ssg-test_audit_rules_execution_chacl_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chacl_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chacl" id="oval:ssg-test_audit_rules_execution_chacl_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chacl_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chcon" id="oval:ssg-test_audit_rules_execution_chcon_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chcon_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chcon" id="oval:ssg-test_audit_rules_execution_chcon_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chcon_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chcon" id="oval:ssg-test_audit_rules_execution_chcon_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chcon_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chcon" id="oval:ssg-test_audit_rules_execution_chcon_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chcon_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chmod" id="oval:ssg-test_audit_rules_execution_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chmod" id="oval:ssg-test_audit_rules_execution_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chmod" id="oval:ssg-test_audit_rules_execution_chmod_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chmod_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chmod" id="oval:ssg-test_audit_rules_execution_chmod_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_chmod_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules crontab" id="oval:ssg-test_audit_rules_execution_crontab_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_crontab_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_execution_crontab_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_crontab_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_execution_crontab_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_crontab_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_execution_crontab_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_crontab_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules rm" id="oval:ssg-test_audit_rules_execution_rm_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_rm_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl rm" id="oval:ssg-test_audit_rules_execution_rm_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_rm_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl rm" id="oval:ssg-test_audit_rules_execution_rm_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_rm_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl rm" id="oval:ssg-test_audit_rules_execution_rm_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_rm_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules setfacl" id="oval:ssg-test_audit_rules_execution_setfacl_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfacl_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl setfacl" id="oval:ssg-test_audit_rules_execution_setfacl_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfacl_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setfacl" id="oval:ssg-test_audit_rules_execution_setfacl_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfacl_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setfacl" id="oval:ssg-test_audit_rules_execution_setfacl_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfacl_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules ssh-agent" id="oval:ssg-test_audit_rules_execution_ssh-agent_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_ssh-agent_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl ssh-agent" id="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl ssh-agent" id="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl ssh-agent" id="oval:ssg-test_audit_rules_execution_ssh-agent_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules faillog" id="oval:ssg-test_arle_faillog_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_faillog_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl faillog" id="oval:ssg-test_arle_faillog_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_faillog_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chage" id="oval:ssg-test_audit_rules_privileged_commands_chage_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chage_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chage" id="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chage" id="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chage" id="oval:ssg-test_audit_rules_privileged_commands_chage_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chfn" id="oval:ssg-test_audit_rules_privileged_commands_chfn_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chfn_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chfn" id="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chfn" id="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chfn" id="oval:ssg-test_audit_rules_privileged_commands_chfn_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules chsh" id="oval:ssg-test_audit_rules_privileged_commands_chsh_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chsh_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl chsh" id="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chsh" id="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl chsh" id="oval:ssg-test_audit_rules_privileged_commands_chsh_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules gpasswd" id="oval:ssg-test_audit_rules_privileged_commands_gpasswd_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_gpasswd_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl gpasswd" id="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl gpasswd" id="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl gpasswd" id="oval:ssg-test_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules insmod" id="oval:ssg-test_audit_rules_privileged_commands_insmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_insmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl insmod" id="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl insmod" id="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl insmod" id="oval:ssg-test_audit_rules_privileged_commands_insmod_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules kmod" id="oval:ssg-test_audit_rules_privileged_commands_kmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_kmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl kmod" id="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl kmod" id="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl kmod" id="oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules modprobe" id="oval:ssg-test_audit_rules_privileged_commands_modprobe_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_modprobe_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl modprobe" id="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl modprobe" id="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl modprobe" id="oval:ssg-test_audit_rules_privileged_commands_modprobe_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules newgrp" id="oval:ssg-test_audit_rules_privileged_commands_newgrp_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgrp_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl newgrp" id="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newgrp" id="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newgrp" id="oval:ssg-test_audit_rules_privileged_commands_newgrp_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules pam_timestamp_check" id="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl pam_timestamp_check" id="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl pam_timestamp_check" id="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl pam_timestamp_check" id="oval:ssg-test_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules passmass" id="oval:ssg-test_audit_rules_privileged_commands_passmass_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passmass_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl passmass" id="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl passmass" id="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl passmass" id="oval:ssg-test_audit_rules_privileged_commands_passmass_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules passwd" id="oval:ssg-test_audit_rules_privileged_commands_passwd_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passwd_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl passwd" id="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl passwd" id="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl passwd" id="oval:ssg-test_audit_rules_privileged_commands_passwd_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules rmmod" id="oval:ssg-test_audit_rules_privileged_commands_rmmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_rmmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl rmmod" id="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl rmmod" id="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl rmmod" id="oval:ssg-test_audit_rules_privileged_commands_rmmod_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules ssh_keysign" id="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl ssh_keysign" id="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl ssh_keysign" id="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl ssh_keysign" id="oval:ssg-test_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules su" id="oval:ssg-test_audit_rules_privileged_commands_su_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_su_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl su" id="oval:ssg-test_audit_rules_privileged_commands_su_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_su_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl su" id="oval:ssg-test_audit_rules_privileged_commands_su_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_su_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl su" id="oval:ssg-test_audit_rules_privileged_commands_su_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_su_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules sudo" id="oval:ssg-test_audit_rules_privileged_commands_sudo_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudo_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl sudo" id="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl sudo" id="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl sudo" id="oval:ssg-test_audit_rules_privileged_commands_sudo_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules sudoedit" id="oval:ssg-test_audit_rules_privileged_commands_sudoedit_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudoedit_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl sudoedit" id="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl sudoedit" id="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl sudoedit" id="oval:ssg-test_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules unix_chkpwd" id="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl unix_chkpwd" id="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl unix_chkpwd" id="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl unix_chkpwd" id="oval:ssg-test_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules usermod" id="oval:ssg-test_audit_rules_privileged_commands_usermod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usermod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl usermod" id="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl usermod" id="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl usermod" id="oval:ssg-test_audit_rules_privileged_commands_usermod_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/cron.allow" id="oval:ssg-test_file_groupowner_cron_allow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_cron_allow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_cron_allow_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/group" id="oval:ssg-test_file_groupowner_etc_group:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_etc_group:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_etc_group_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/gshadow" id="oval:ssg-test_file_groupowner_etc_gshadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_etc_gshadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_etc_gshadow_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/passwd" id="oval:ssg-test_file_groupowner_etc_passwd:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_etc_passwd:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_etc_passwd_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/shadow" id="oval:ssg-test_file_groupowner_etc_shadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_etc_shadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_etc_shadow_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /boot/grub/grub.conf" id="oval:ssg-test_file_groupowner_grub_conf:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_groupowner_grub_conf:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_groupowner_grub_conf_gid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/cron.allow" id="oval:ssg-test_file_owner_cron_allow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_cron_allow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_cron_allow_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/group" id="oval:ssg-test_file_owner_etc_group:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_etc_group:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_etc_group_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/gshadow" id="oval:ssg-test_file_owner_etc_gshadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_etc_gshadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_etc_gshadow_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/passwd" id="oval:ssg-test_file_owner_etc_passwd:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_etc_passwd:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_etc_passwd_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/shadow" id="oval:ssg-test_file_owner_etc_shadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_etc_shadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_etc_shadow_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /boot/grub/grub.conf" id="oval:ssg-test_file_owner_grub_conf:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_owner_grub_conf:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_owner_grub_conf_uid_0:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/cron.allow" id="oval:ssg-test_file_permissions_cron_allow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_cron_allow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_cron_allow_mode_0644:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/group" id="oval:ssg-test_file_permissions_etc_group:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_etc_group:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_etc_group_mode_0644:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/gshadow" id="oval:ssg-test_file_permissions_etc_gshadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_etc_gshadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_etc_gshadow_mode_0000:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/passwd" id="oval:ssg-test_file_permissions_etc_passwd:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_etc_passwd:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_etc_passwd_mode_0644:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/shadow" id="oval:ssg-test_file_permissions_etc_shadow:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_etc_shadow:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_etc_shadow_mode_0000:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /boot/grub/grub.conf" id="oval:ssg-test_file_permissions_grub_conf:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_grub_conf:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_grub_conf_mode_0600:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/httpd/conf.d/^.*$" id="oval:ssg-test_file_permissions_httpd_server_conf_d_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_httpd_server_conf_d_files:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_httpd_server_conf_d_files_mode_0640:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/httpd/conf/^.*$" id="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_httpd_server_conf_files_mode_0640:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/httpd/conf.modules.d/^.*$" id="oval:ssg-test_file_permissions_https_server_modules_files:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_https_server_modules_files:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_https_server_modules_files_mode_0640:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/ssh/^.*_key$" id="oval:ssg-test_file_permissions_sshd_private_key:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_sshd_private_key:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_sshd_private_key_mode_0600:ste:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing mode of /etc/ssh/^.*.pub$" id="oval:ssg-test_file_permissions_sshd_pub_key:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_file_permissions_sshd_pub_key:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_file_permissions_sshd_pub_key_mode_0644:ste:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled" id="oval:ssg-test_kernmod_bluetooth_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_bluetooth_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_bluetooth_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_bluetooth_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_bluetooth_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_bluetooth_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_bluetooth_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled" id="oval:ssg-test_kernmod_cramfs_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_cramfs_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_cramfs_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_cramfs_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_cramfs_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_cramfs_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_cramfs_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled" id="oval:ssg-test_kernmod_dccp_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_dccp_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_dccp_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_dccp_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_dccp_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module dccp disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_dccp_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_dccp_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled" id="oval:ssg-test_kernmod_freevxfs_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_freevxfs_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_freevxfs_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_freevxfs_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_freevxfs_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_freevxfs_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_freevxfs_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled" id="oval:ssg-test_kernmod_hfs_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_hfs_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_hfs_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_hfs_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_hfs_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfs disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_hfs_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfs_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled" id="oval:ssg-test_kernmod_hfsplus_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_hfsplus_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_hfsplus_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_hfsplus_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_hfsplus_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_hfsplus_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_hfsplus_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled" id="oval:ssg-test_kernmod_jffs2_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_jffs2_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_jffs2_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_jffs2_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_jffs2_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_jffs2_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_jffs2_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled" id="oval:ssg-test_kernmod_sctp_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_sctp_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_sctp_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_sctp_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_sctp_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module sctp disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_sctp_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_sctp_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled" id="oval:ssg-test_kernmod_squashfs_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_squashfs_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_squashfs_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_squashfs_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_squashfs_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_squashfs_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_squashfs_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled" id="oval:ssg-test_kernmod_udf_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_udf_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_udf_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_udf_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_udf_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_udf_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module udf disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_udf_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_udf_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled" id="oval:ssg-test_kernmod_usb-storage_disabled:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /etc/modules-load.d" id="oval:ssg-test_kernmod_usb-storage_etcmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_etcmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /run/modules-load.d" id="oval:ssg-test_kernmod_usb-storage_runmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_runmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /usr/lib/modules-load.d" id="oval:ssg-test_kernmod_usb-storage_libmodules-load:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_libmodules-load:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /run/modprobe.d" id="oval:ssg-test_kernmod_usb-storage_runmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_runmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /usr/lib/modprobe.d" id="oval:ssg-test_kernmod_usb-storage_libmodprobed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_kernmod_usb-storage_libmodprobed:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nodev on /dev/shm" id="oval:ssg-test_dev_shm_partition_nodev:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_dev_shm_partition_nodev:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_dev_shm_partition_nodev:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="noexec on /dev/shm" id="oval:ssg-test_dev_shm_partition_noexec:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_dev_shm_partition_noexec:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_dev_shm_partition_noexec:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nosuid on /dev/shm" id="oval:ssg-test_dev_shm_partition_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_dev_shm_partition_nosuid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_dev_shm_partition_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nodev on /home" id="oval:ssg-test_home_partition_nodev:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_home_partition_nodev:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_home_partition_nodev:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nosuid on /home" id="oval:ssg-test_home_partition_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_home_partition_nosuid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_home_partition_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nodev on /tmp" id="oval:ssg-test_tmp_partition_nodev:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_tmp_partition_nodev:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_tmp_partition_nodev:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="noexec on /tmp" id="oval:ssg-test_tmp_partition_noexec:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_tmp_partition_noexec:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_tmp_partition_noexec:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nosuid on /tmp" id="oval:ssg-test_tmp_partition_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_tmp_partition_nosuid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_tmp_partition_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nodev on /var/tmp" id="oval:ssg-test_var_tmp_partition_nodev:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_var_tmp_partition_nodev:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_var_tmp_partition_nodev:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="noexec on /var/tmp" id="oval:ssg-test_var_tmp_partition_noexec:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_var_tmp_partition_noexec:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_var_tmp_partition_noexec:ste:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="nosuid on /var/tmp" id="oval:ssg-test_var_tmp_partition_nosuid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_var_tmp_partition_nosuid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_var_tmp_partition_nosuid:ste:1"/>
        </ns5:partition_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package SuSEfirewall2 is installed" id="oval:ssg-test_package_SuSEfirewall2_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_SuSEfirewall2_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package abrt is removed" id="oval:ssg-test_package_abrt_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_abrt_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package acpid is removed" id="oval:ssg-test_package_acpid_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_acpid_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package aide is installed" id="oval:ssg-test_package_aide_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_aide_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package apparmor-parser is installed" id="oval:ssg-test_package_apparmor-parser_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_apparmor-parser_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package at is removed" id="oval:ssg-test_package_at_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_at_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package audit-audispd-plugins is installed" id="oval:ssg-test_package_audit-audispd-plugins_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_audit-audispd-plugins_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package audit is installed" id="oval:ssg-test_package_audit_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_audit_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package autofs is removed" id="oval:ssg-test_package_autofs_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_autofs_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package avahi is removed" id="oval:ssg-test_package_avahi_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_avahi_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package bind is removed" id="oval:ssg-test_package_bind_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_bind_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package bluez is removed" id="oval:ssg-test_package_bluez_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_bluez_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package certmonger is removed" id="oval:ssg-test_package_certmonger_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_certmonger_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package chrony is installed" id="oval:ssg-test_package_chrony_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_chrony_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package coolkey is installed" id="oval:ssg-test_package_coolkey_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_coolkey_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package cronie is installed" id="oval:ssg-test_package_cronie_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_cronie_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package cups is removed" id="oval:ssg-test_package_cups_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_cups_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package cyrus-sasl is removed" id="oval:ssg-test_package_cyrus-sasl_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_cyrus-sasl_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package dbus is removed" id="oval:ssg-test_package_dbus_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_dbus_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package dconf is installed" id="oval:ssg-test_package_dconf_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_dconf_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package dhcp is removed" id="oval:ssg-test_package_dhcp_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_dhcp_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package docker is installed" id="oval:ssg-test_package_docker_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_docker_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package dovecot is removed" id="oval:ssg-test_package_dovecot_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_dovecot_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package esc is installed" id="oval:ssg-test_package_esc_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_esc_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package firewalld is installed" id="oval:ssg-test_package_firewalld_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_firewalld_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package gdm is installed" id="oval:ssg-test_package_gdm_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_gdm_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package httpd is removed" id="oval:ssg-test_package_httpd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_httpd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package iputils is removed" id="oval:ssg-test_package_iputils_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_iputils_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package irqbalance is installed" id="oval:ssg-test_package_irqbalance_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_irqbalance_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package kbd is installed" id="oval:ssg-test_package_kbd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_kbd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package kernel-tools is removed" id="oval:ssg-test_package_kernel-tools_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_kernel-tools_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package kexec-tools is removed" id="oval:ssg-test_package_kexec-tools_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_kexec-tools_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package libcgroup-tools is removed" id="oval:ssg-test_package_libcgroup-tools_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_libcgroup-tools_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package libcgroup is removed" id="oval:ssg-test_package_libcgroup_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_libcgroup_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package libreswan is installed" id="oval:ssg-test_package_libreswan_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_libreswan_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package mdadm is removed" id="oval:ssg-test_package_mdadm_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_mdadm_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package mozilla-nss-tools is installed" id="oval:ssg-test_package_mozilla-nss-tools_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_mozilla-nss-tools_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package mozilla-nss is installed" id="oval:ssg-test_package_mozilla-nss_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_mozilla-nss_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package net-snmp is removed" id="oval:ssg-test_package_net-snmp_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_net-snmp_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package nfs-utils is removed" id="oval:ssg-test_package_nfs-utils_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_nfs-utils_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package ntp is installed" id="oval:ssg-test_package_ntp_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_ntp_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package ntp is removed" id="oval:ssg-test_package_ntp_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_ntp_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package ntpdate is removed" id="oval:ssg-test_package_ntpdate_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_ntpdate_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package oddjob is removed" id="oval:ssg-test_package_oddjob_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_oddjob_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package opensc is installed" id="oval:ssg-test_package_opensc_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_opensc_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package openssh is installed" id="oval:ssg-test_package_openssh_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_openssh_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package openssh is removed" id="oval:ssg-test_package_openssh_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_openssh_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package pam_apparmor is installed" id="oval:ssg-test_package_pam_apparmor_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_pam_apparmor_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package pam_pkcs11 is installed" id="oval:ssg-test_package_pam_pkcs11_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_pam_pkcs11_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package pcsc-ccid is installed" id="oval:ssg-test_package_pcsc-ccid_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_pcsc-ccid_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package pcsc-lite is installed" id="oval:ssg-test_package_pcsc-lite_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_pcsc-lite_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package pcsc-tools is installed" id="oval:ssg-test_package_pcsc-tools_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_pcsc-tools_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package policycoreutils is installed" id="oval:ssg-test_package_policycoreutils_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_policycoreutils_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package portreserve is removed" id="oval:ssg-test_package_portreserve_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_portreserve_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package postfix is installed" id="oval:ssg-test_package_postfix_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_postfix_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package psacct is installed" id="oval:ssg-test_package_psacct_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_psacct_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package qpid-cpp-server is removed" id="oval:ssg-test_package_qpid-cpp-server_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package quagga is removed" id="oval:ssg-test_package_quagga_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_quagga_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package quota-nld is removed" id="oval:ssg-test_package_quota-nld_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_quota-nld_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package rhnsd is removed" id="oval:ssg-test_package_rhnsd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_rhnsd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package rsh-server is removed" id="oval:ssg-test_package_rsh-server_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_rsh-server_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package rsh is removed" id="oval:ssg-test_package_rsh_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_rsh_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package rsyslog is installed" id="oval:ssg-test_package_rsyslog_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_rsyslog_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package samba is removed" id="oval:ssg-test_package_samba_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_samba_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package screen is installed" id="oval:ssg-test_package_screen_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_screen_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package smartmontools is removed" id="oval:ssg-test_package_smartmontools_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_smartmontools_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package squid is removed" id="oval:ssg-test_package_squid_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_squid_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package sssd is installed" id="oval:ssg-test_package_sssd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_sssd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package sssd is removed" id="oval:ssg-test_package_sssd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_sssd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package subscription-manager is removed" id="oval:ssg-test_package_subscription-manager_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_subscription-manager_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package sysstat is removed" id="oval:ssg-test_package_sysstat_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_sysstat_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package systemd is installed" id="oval:ssg-test_package_systemd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_systemd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package systemd is removed" id="oval:ssg-test_package_systemd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_systemd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package talk-server is removed" id="oval:ssg-test_package_talk-server_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_talk-server_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package talk is removed" id="oval:ssg-test_package_talk_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_talk_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package tcp_wrappers is installed" id="oval:ssg-test_package_tcp_wrappers_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_tcp_wrappers_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package telnet-server is removed" id="oval:ssg-test_package_telnet-server_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_telnet-server_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package telnet is removed" id="oval:ssg-test_package_telnet_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_telnet_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package tftp-server is removed" id="oval:ssg-test_package_tftp-server_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_tftp-server_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package tftp is removed" id="oval:ssg-test_package_tftp_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_tftp_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package vlock is installed" id="oval:ssg-test_package_vlock_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_vlock_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package vsftpd is installed" id="oval:ssg-test_package_vsftpd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_vsftpd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package vsftpd is removed" id="oval:ssg-test_package_vsftpd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_vsftpd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package xinetd is installed" id="oval:ssg-test_package_xinetd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_xinetd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package xinetd is removed" id="oval:ssg-test_package_xinetd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_xinetd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package ypbind is removed" id="oval:ssg-test_package_ypbind_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_ypbind_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package ypserv is removed" id="oval:ssg-test_package_ypserv_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_ypserv_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="/var on own partition" id="oval:ssg-test_var_partition:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_mount_var_own_partition:obj:1"/>
        </ns5:partition_test>
        <ns5:partition_test check="all" check_existence="all_exist" comment="/var/log/audit on own partition" id="oval:ssg-test_var_log_audit_partition:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_mount_var_log_audit_own_partition:obj:1"/>
        </ns5:partition_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_SuSEfirewall2:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_SuSEfirewall2_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_SuSEfirewall2_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_SuSEfirewall2_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_SuSEfirewall2_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_SuSEfirewall2_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the SuSEfirewall2 service is running" id="oval:ssg-test_service_running_SuSEfirewall2:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_SuSEfirewall2:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_SuSEfirewall2:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_abrtd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_abrtd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_abrtd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_abrtd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_abrtd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_abrtd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the abrtd service is not running" id="oval:ssg-test_service_not_running_abrtd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_abrtd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_abrtd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_acpid_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_acpid_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_acpid_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_acpid_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_acpid_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_acpid_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the acpid service is not running" id="oval:ssg-test_service_not_running_acpid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_acpid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_acpid:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_apparmor:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_apparmor_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_apparmor_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_apparmor_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_apparmor_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_apparmor_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the apparmor service is running" id="oval:ssg-test_service_running_apparmor:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_apparmor:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_apparmor:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_atd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_atd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_atd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_atd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_atd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_atd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the atd service is not running" id="oval:ssg-test_service_not_running_atd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_atd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_atd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_auditd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_auditd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_auditd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_auditd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_auditd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_auditd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the auditd service is running" id="oval:ssg-test_service_running_auditd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_auditd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_auditd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_autofs_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_autofs_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_autofs_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_autofs_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_autofs_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_autofs_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the autofs service is not running" id="oval:ssg-test_service_not_running_autofs:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_autofs:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_autofs:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_avahi-daemon_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_avahi-daemon_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_avahi-daemon_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_avahi-daemon_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_avahi-daemon_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_avahi-daemon_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the avahi-daemon service is not running" id="oval:ssg-test_service_not_running_avahi-daemon:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_avahi-daemon:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_avahi-daemon:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_bluetooth_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_bluetooth_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_bluetooth_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_bluetooth_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_bluetooth_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_bluetooth_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the bluetooth service is not running" id="oval:ssg-test_service_not_running_bluetooth:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_bluetooth:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_bluetooth:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_certmonger_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_certmonger_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_certmonger_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_certmonger_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_certmonger_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_certmonger_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the certmonger service is not running" id="oval:ssg-test_service_not_running_certmonger:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_certmonger:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_certmonger:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cgconfig_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cgconfig_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cgconfig_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cgconfig_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cgconfig_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cgconfig_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the cgconfig service is not running" id="oval:ssg-test_service_not_running_cgconfig:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_cgconfig:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_cgconfig:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cgred_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cgred_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cgred_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cgred_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cgred_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cgred_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the cgred service is not running" id="oval:ssg-test_service_not_running_cgred:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_cgred:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_cgred:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_chronyd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_chronyd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_chronyd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_chronyd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_chronyd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_chronyd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the chronyd service is running" id="oval:ssg-test_service_running_chronyd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_chronyd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_chronyd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cpupower_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cpupower_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cpupower_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cpupower_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cpupower_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cpupower_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the cpupower service is not running" id="oval:ssg-test_service_not_running_cpupower:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_cpupower:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_cpupower:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_crond:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_crond_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_crond_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_crond_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_crond_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_crond_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the crond service is running" id="oval:ssg-test_service_running_crond:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_crond:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_crond:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cups_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cups_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cups_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_cups_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_cups_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_cups_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the cups service is not running" id="oval:ssg-test_service_not_running_cups:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_cups:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_cups:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_debug-shell_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_debug-shell_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_debug-shell_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_debug-shell_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_debug-shell_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_debug-shell_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the debug-shell service is not running" id="oval:ssg-test_service_not_running_debug-shell:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_debug-shell:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_debug-shell:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_dhcpd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_dhcpd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_dhcpd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_dhcpd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_dhcpd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_dhcpd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the dhcpd service is not running" id="oval:ssg-test_service_not_running_dhcpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_dhcpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_dhcpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_docker:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_docker_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_docker_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_docker_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_docker_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_docker_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the docker service is running" id="oval:ssg-test_service_running_docker:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_docker:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_docker:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_dovecot_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_dovecot_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_dovecot_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_dovecot_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_dovecot_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_dovecot_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the dovecot service is not running" id="oval:ssg-test_service_not_running_dovecot:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_dovecot:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_dovecot:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_firewalld:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_firewalld_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_firewalld_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_firewalld_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_firewalld_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_firewalld_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the firewalld service is running" id="oval:ssg-test_service_running_firewalld:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_firewalld:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_firewalld:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_httpd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_httpd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_httpd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_httpd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_httpd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_httpd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the httpd service is not running" id="oval:ssg-test_service_not_running_httpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_httpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_httpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_irqbalance:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_irqbalance_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_irqbalance_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_irqbalance_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_irqbalance_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_irqbalance_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the irqbalance service is running" id="oval:ssg-test_service_running_irqbalance:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_irqbalance:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_irqbalance:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_kdump_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_kdump_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_kdump_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_kdump_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_kdump_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_kdump_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the kdump service is not running" id="oval:ssg-test_service_not_running_kdump:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_kdump:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_kdump:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_mdmonitor_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_mdmonitor_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_mdmonitor_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_mdmonitor_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_mdmonitor_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_mdmonitor_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the mdmonitor service is not running" id="oval:ssg-test_service_not_running_mdmonitor:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_mdmonitor:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_mdmonitor:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_messagebus_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_messagebus_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_messagebus_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_messagebus_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_messagebus_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_messagebus_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the messagebus service is not running" id="oval:ssg-test_service_not_running_messagebus:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_messagebus:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_messagebus:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_named_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_named_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_named_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_named_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_named_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_named_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the named service is not running" id="oval:ssg-test_service_not_running_named:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_named:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_named:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_nfs_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_nfs_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_nfs_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_nfs_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_nfs_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_nfs_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the nfs service is not running" id="oval:ssg-test_service_not_running_nfs:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_nfs:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_nfs:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_nfslock_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_nfslock_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_nfslock_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_nfslock_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_nfslock_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_nfslock_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the nfslock service is not running" id="oval:ssg-test_service_not_running_nfslock:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_nfslock:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_nfslock:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ntpd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ntpd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the ntpd service is not running" id="oval:ssg-test_service_not_running_ntpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_ntpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_ntpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_ntpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_ntpd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the ntpd service is running" id="oval:ssg-test_service_running_ntpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_ntpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_ntpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ntpdate_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpdate_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpdate_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ntpdate_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ntpdate_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ntpdate_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the ntpdate service is not running" id="oval:ssg-test_service_not_running_ntpdate:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_ntpdate:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_ntpdate:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_oddjobd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_oddjobd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_oddjobd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_oddjobd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_oddjobd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_oddjobd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the oddjobd service is not running" id="oval:ssg-test_service_not_running_oddjobd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_oddjobd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_oddjobd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_pcscd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_pcscd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_pcscd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_pcscd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_pcscd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_pcscd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the pcscd service is running" id="oval:ssg-test_service_running_pcscd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_pcscd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_pcscd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_portreserve_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_portreserve_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_portreserve_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_portreserve_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_portreserve_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_portreserve_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the portreserve service is not running" id="oval:ssg-test_service_not_running_portreserve:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_portreserve:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_portreserve:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_postfix:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_postfix_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_postfix_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_postfix_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_postfix_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_postfix_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the postfix service is running" id="oval:ssg-test_service_running_postfix:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_postfix:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_postfix:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_psacct:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_psacct_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_psacct_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_psacct_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_psacct_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_psacct_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the psacct service is running" id="oval:ssg-test_service_running_psacct:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_psacct:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_psacct:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_qpidd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_qpidd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_qpidd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_qpidd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_qpidd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_qpidd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the qpidd service is not running" id="oval:ssg-test_service_not_running_qpidd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_qpidd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_qpidd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_quota_nld_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_quota_nld_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_quota_nld_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_quota_nld_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_quota_nld_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_quota_nld_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the quota_nld service is not running" id="oval:ssg-test_service_not_running_quota_nld:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_quota_nld:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_quota_nld:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rdisc_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rdisc_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rdisc_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rdisc_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rdisc_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rdisc_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rdisc service is not running" id="oval:ssg-test_service_not_running_rdisc:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rdisc:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rdisc:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rexec_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rexec_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rexec_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rexec_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rexec_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rexec_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rexec service is not running" id="oval:ssg-test_service_not_running_rexec:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rexec:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rexec:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rhnsd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rhnsd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rhnsd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rhnsd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rhnsd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rhnsd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rhnsd service is not running" id="oval:ssg-test_service_not_running_rhnsd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rhnsd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rhnsd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rhsmcertd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rhsmcertd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rhsmcertd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rhsmcertd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rhsmcertd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rhsmcertd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rhsmcertd service is not running" id="oval:ssg-test_service_not_running_rhsmcertd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rhsmcertd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rhsmcertd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rlogin_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rlogin_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rlogin_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rlogin_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rlogin_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rlogin_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rlogin service is not running" id="oval:ssg-test_service_not_running_rlogin:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rlogin:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rlogin:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcbind_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcbind_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcbind_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcbind_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcbind_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcbind_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rpcbind service is not running" id="oval:ssg-test_service_not_running_rpcbind:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rpcbind:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rpcbind:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcgssd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcgssd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcgssd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcgssd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcgssd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcgssd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rpcgssd service is not running" id="oval:ssg-test_service_not_running_rpcgssd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rpcgssd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rpcgssd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcidmapd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcidmapd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcidmapd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcidmapd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcidmapd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcidmapd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rpcidmapd service is not running" id="oval:ssg-test_service_not_running_rpcidmapd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rpcidmapd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rpcidmapd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcsvcgssd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcsvcgssd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcsvcgssd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rpcsvcgssd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rpcsvcgssd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rpcsvcgssd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rpcsvcgssd service is not running" id="oval:ssg-test_service_not_running_rpcsvcgssd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rpcsvcgssd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rpcsvcgssd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rsh_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rsh_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rsh_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_rsh_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rsh_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rsh_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the rsh service is not running" id="oval:ssg-test_service_not_running_rsh:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_rsh:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_rsh:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_rsyslog:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rsyslog_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_rsyslog_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the rsyslog service is running" id="oval:ssg-test_service_running_rsyslog:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_rsyslog:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_rsyslog:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_saslauthd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_saslauthd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_saslauthd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_saslauthd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_saslauthd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_saslauthd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the saslauthd service is not running" id="oval:ssg-test_service_not_running_saslauthd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_saslauthd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_saslauthd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_smartd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_smartd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_smartd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_smartd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_smartd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_smartd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the smartd service is not running" id="oval:ssg-test_service_not_running_smartd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_smartd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_smartd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_smb_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_smb_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_smb_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_smb_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_smb_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_smb_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the smb service is not running" id="oval:ssg-test_service_not_running_smb:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_smb:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_smb:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_snmpd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_snmpd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_snmpd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_snmpd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_snmpd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_snmpd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the snmpd service is not running" id="oval:ssg-test_service_not_running_snmpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_snmpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_snmpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_squid_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_squid_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_squid_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_squid_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_squid_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_squid_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the squid service is not running" id="oval:ssg-test_service_not_running_squid:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_squid:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_squid:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sshd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sshd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sshd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sshd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sshd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sshd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the sshd service is not running" id="oval:ssg-test_service_not_running_sshd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_sshd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_sshd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_sshd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sshd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sshd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_sshd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sshd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sshd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the sshd service is running" id="oval:ssg-test_service_running_sshd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_sshd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_sshd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sssd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sssd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sssd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sssd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sssd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sssd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the sssd service is not running" id="oval:ssg-test_service_not_running_sssd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_sssd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_sssd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_sssd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sssd_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sssd_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_multi_user_wants_sssd_socket:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sssd_socket_enabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sssd_socket_on:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="at least one" check_existence="at_least_one_exists" comment="Test that the sssd service is running" id="oval:ssg-test_service_running_sssd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_running_sssd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_running_sssd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sysstat_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sysstat_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sysstat_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_sysstat_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_sysstat_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_sysstat_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the sysstat service is not running" id="oval:ssg-test_service_not_running_sysstat:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_sysstat:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_sysstat:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_telnet_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_telnet_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_telnet_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_telnet_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_telnet_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_telnet_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the telnet service is not running" id="oval:ssg-test_service_not_running_telnet:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_telnet:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_telnet:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_tftp_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_tftp_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_tftp_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_tftp_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_tftp_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_tftp_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the tftp service is not running" id="oval:ssg-test_service_not_running_tftp:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_tftp:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_tftp:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_vsftpd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_vsftpd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_vsftpd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_vsftpd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_vsftpd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_vsftpd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the vsftpd service is not running" id="oval:ssg-test_service_not_running_vsftpd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_vsftpd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_vsftpd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_xinetd_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_xinetd_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_xinetd_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_xinetd_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_xinetd_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_xinetd_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the xinetd service is not running" id="oval:ssg-test_service_not_running_xinetd:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_xinetd:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_xinetd:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ypbind_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ypbind_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ypbind_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_ypbind_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_ypbind_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_ypbind_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the ypbind service is not running" id="oval:ssg-test_service_not_running_ypbind:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_ypbind:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_ypbind:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_zebra_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_zebra_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_zebra_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitdependency_test check="all" check_existence="any_exist" comment="systemd test" id="oval:ssg-test_zebra_socket_not_wanted_by_multi_user_target:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_multi_user_target_for_zebra_socket_disabled:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_systemd_zebra_socket_off:ste:1"/>
        </ns5:systemdunitdependency_test>
        <ns5:systemdunitproperty_test check="all" check_existence="any_exist" comment="Test that the zebra service is not running" id="oval:ssg-test_service_not_running_zebra:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_service_not_running_zebra:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_service_not_running_zebra:ste:1"/>
        </ns5:systemdunitproperty_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter fs.suid_dumpable set to 0" id="oval:ssg-test_sysctl_runtime_fs_suid_dumpable:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_fs_suid_dumpable:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_fs_suid_dumpable:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter kernel.kptr_restrict set to 1" id="oval:ssg-test_sysctl_runtime_kernel_kptr_restrict:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_kernel_kptr_restrict:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_kernel_kptr_restrict:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter kernel.randomize_va_space set to 2" id="oval:ssg-test_sysctl_runtime_kernel_randomize_va_space:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_kernel_randomize_va_space:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_kernel_randomize_va_space:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_accept_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_accept_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_accept_source_route:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_accept_source_route:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_log_martians:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_log_martians:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_log_martians:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_rp_filter:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_rp_filter:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_rp_filter:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_secure_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_secure_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_all_send_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_send_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_send_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_accept_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_accept_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_accept_source_route:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_accept_source_route:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.log_martians set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_log_martians:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_log_martians:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_log_martians:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_rp_filter:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_rp_filter:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_rp_filter:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_secure_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_secure_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" id="oval:ssg-test_sysctl_runtime_net_ipv4_conf_default_send_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_send_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_send_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.ip_forward set to 0" id="oval:ssg-test_sysctl_runtime_net_ipv4_ip_forward:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_ip_forward:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_ip_forward:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.tcp_syncookies set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv4_tcp_syncookies:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv4_tcp_syncookies:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv4_tcp_syncookies:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.all.accept_ra set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_ra:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_ra:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_ra:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.all.accept_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.all.accept_source_route set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_source_route:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_source_route:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.all.disable_ipv6 set to 1" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.all.forwarding set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_all_forwarding:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_forwarding:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_forwarding:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.default.accept_ra set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_ra:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_ra:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_ra:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_redirects:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_redirects:ste:1"/>
        </ns4:sysctl_test>
        <ns4:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.default.accept_source_route set to the appropriate value" id="oval:ssg-test_sysctl_runtime_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_source_route:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_source_route:ste:1"/>
        </ns4:sysctl_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="fs.suid_dumpable static configuration" id="oval:ssg-test_static_sysctl_fs_suid_dumpable:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_fs_suid_dumpable:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="fs.suid_dumpable static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_fs_suid_dumpable:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_fs_suid_dumpable:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="fs.suid_dumpable static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_fs_suid_dumpable:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_fs_suid_dumpable:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="fs.suid_dumpable static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_fs_suid_dumpable:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_fs_suid_dumpable:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="kernel.kptr_restrict static configuration" id="oval:ssg-test_static_sysctl_kernel_kptr_restrict:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_kernel_kptr_restrict:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.kptr_restrict static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_kernel_kptr_restrict:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_kernel_kptr_restrict:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.kptr_restrict static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_kernel_kptr_restrict:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_kernel_kptr_restrict:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.kptr_restrict static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_kernel_kptr_restrict:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_kernel_kptr_restrict:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="kernel.randomize_va_space static configuration" id="oval:ssg-test_static_sysctl_kernel_randomize_va_space:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_kernel_randomize_va_space:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.randomize_va_space static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_kernel_randomize_va_space:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_kernel_randomize_va_space:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.randomize_va_space static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_kernel_randomize_va_space:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_kernel_randomize_va_space:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="kernel.randomize_va_space static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_kernel_randomize_va_space:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_kernel_randomize_va_space:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.accept_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.accept_source_route static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.log_martians static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.rp_filter static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.secure_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.all.send_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_all_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_all_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_all_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_all_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_all_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.accept_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.accept_source_route static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.log_martians static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.log_martians static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_log_martians:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_log_martians:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_log_martians:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.rp_filter static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_rp_filter:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_rp_filter:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.secure_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_secure_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.conf.default.send_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_conf_default_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_conf_default_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_conf_default_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_conf_default_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_conf_default_send_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_send_redirects:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.icmp_echo_ignore_broadcasts static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.icmp_ignore_bogus_error_responses static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.ip_forward static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_ip_forward:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_ip_forward:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.ip_forward static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_ip_forward:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_ip_forward:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.ip_forward static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_ip_forward:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_ip_forward:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.ip_forward static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_ip_forward:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_ip_forward:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv4.tcp_syncookies static configuration" id="oval:ssg-test_static_sysctl_net_ipv4_tcp_syncookies:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv4_tcp_syncookies:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.tcp_syncookies static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv4_tcp_syncookies:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv4_tcp_syncookies:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.tcp_syncookies static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv4_tcp_syncookies:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv4_tcp_syncookies:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv4.tcp_syncookies static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv4_tcp_syncookies:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_tcp_syncookies:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.all.accept_ra static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.all.accept_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.all.accept_source_route static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.all.disable_ipv6 static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_all_disable_ipv6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_all_disable_ipv6:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.disable_ipv6 static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.disable_ipv6 static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.disable_ipv6 static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_disable_ipv6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.all.forwarding static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_all_forwarding:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_all_forwarding:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_all_forwarding:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_forwarding:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_all_forwarding:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_forwarding:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_all_forwarding:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_forwarding:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.default.accept_ra static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_ra:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_ra:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.default.accept_redirects static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_redirects:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="net.ipv6.conf.default.accept_source_route static configuration" id="oval:ssg-test_static_sysctl_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_etc_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_run_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.d/*.conf" id="oval:ssg-test_static_usr_lib_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_source_route:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl" id="oval:ssg-test_audit_rules_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules" id="oval:ssg-test_audit_rules_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="log_group = root" id="oval:ssg-test_auditd_conf_log_group_not_root:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_auditd_conf_log_group_root:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="check for GRUB_CMDLINE_LINUX_DEFAULT in /etc/default/grub" id="oval:ssg-test_grub2_default_exists:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_grub2_default_exists:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 6" id="oval:ssg-test_centos6:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_centos6:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_centos6:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 7" id="oval:ssg-test_centos7:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_centos7:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_centos7:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 8" id="oval:ssg-test_centos8:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_centos8:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_centos8:ste:1"/>
        </ns5:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/debian_version exists" id="oval:ssg-test_debian:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_debian:obj:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Debian version" id="oval:ssg-test_debian_8:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_debian_8:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="only_one_exists" comment="fedora-release RPM package is installed" id="oval:ssg-test_fedora_release_rpm:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_fedora_release_rpm:obj:1"/>
        </ns5:rpminfo_test>
        <ns3:textfilecontent54_test check="all" comment="CPE vendor is 'fedoraproject' and 'product' is fedora" id="oval:ssg-test_fedora_vendor_product:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_fedora_vendor_product:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 6" id="oval:ssg-test_ol6_system:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ol6_system:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ol6_system:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 7" id="oval:ssg-test_ol7_system:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ol7_system:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ol7_system:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 8" id="oval:ssg-test_ol8_system:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ol8_system:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ol8_system:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE is installed" id="oval:ssg-test_opensuse_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_opensuse_installed:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_opensuse_installed:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE Leap 15 is installed" id="oval:ssg-test_opensuse_leap15_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_opensuse_leap15_installed:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_opensuse_leap15_installed:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE Leap 42 is installed" id="oval:ssg-test_opensuse_leap42_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_opensuse_leap42_installed:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_opensuse_leap42_installed:ste:1"/>
        </ns5:rpminfo_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="Test installed OS is part of the unix family" id="oval:ssg-test_unix_family:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_unix_family:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_unix_family:ste:1"/>
        </ns3:family_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-client is version 6" id="oval:ssg-test_rhel_client:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel_client:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel_client:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 6" id="oval:ssg-test_rhel_workstation:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel_workstation:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel_workstation:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 6" id="oval:ssg-test_rhel_server:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel_server:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel_server:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 6" id="oval:ssg-test_rhel_computenode:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel_computenode:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel_computenode:ste:1"/>
        </ns5:rpminfo_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel7_unix_family:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel7_unix_family:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel7_unix_family:ste:1"/>
        </ns3:family_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-client is version 7" id="oval:ssg-test_rhel7_client:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel7_client:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel7_client:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 7" id="oval:ssg-test_rhel7_workstation:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel7_workstation:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel7_workstation:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 7" id="oval:ssg-test_rhel7_server:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel7_server:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel7_server:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 7" id="oval:ssg-test_rhel7_computenode:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel7_computenode:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel7_computenode:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="only_one_exists" comment="redhat-release-virtualization-host RPM package is installed" id="oval:ssg-test_redhat_release_virtualization_host_rpm:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_redhat_release_virtualization_host_rpm:obj:1"/>
        </ns5:rpminfo_test>
        <ns3:textfilecontent54_test check="all" comment="RHEVH base RHEL is version 7" id="oval:ssg-test_rhev_rhel_version:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhevh_rhel_version:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhevh_rhel_version:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel8_unix_family:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel8_unix_family:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel8_unix_family:ste:1"/>
        </ns3:family_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release is version 8" id="oval:ssg-test_rhel8:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel8:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel8:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="only_one_exists" comment="redhat-release-virtualization-host RPM package is installed" id="oval:ssg-test_rhvh4_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhvh4_version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhvh4_version:ste:1"/>
        </ns5:rpminfo_test>
        <ns3:textfilecontent54_test check="all" comment="RHEVH base RHEL is version 7" id="oval:ssg-test_rhelh4_version:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhelh4_version:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhelh4_version:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 6" id="oval:ssg-test_sl6:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sl6:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sl6:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 7" id="oval:ssg-test_sl7:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sl7:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sl7:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 8" id="oval:ssg-test_sl8:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sl8:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sl8:ste:1"/>
        </ns5:rpminfo_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_sle11_unix_family:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle11_unix_family:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle11_unix_family:ste:1"/>
        </ns3:family_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sled-release is version 6" id="oval:ssg-test_sle11_desktop:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle11_desktop:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle11_desktop:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-release is version 6" id="oval:ssg-test_sle11_server:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle11_server:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle11_server:ste:1"/>
        </ns5:rpminfo_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_sle12_unix_family:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle12_unix_family:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle12_unix_family:ste:1"/>
        </ns3:family_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sled-release is version 6" id="oval:ssg-test_sle12_desktop:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle12_desktop:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle12_desktop:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-release is version 6" id="oval:ssg-test_sle12_server:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle12_server:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle12_server:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-sap is version 12" id="oval:ssg-test_sle12_sap:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle12_sap:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle12_sap:ste:1"/>
        </ns5:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/lsb-release exists" id="oval:ssg-test_lsb:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_lsb:obj:1"/>
        </ns4:file_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu" id="oval:ssg-test_ubuntu:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ubuntu:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_trusty:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ubuntu_trusty:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_xenial:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ubuntu_xenial:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_bionic:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ubuntu_bionic:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_unix_wrlinux:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_unix_wrlinux:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_unix_wrlinux:ste:1"/>
        </ns3:family_test>
        <ns4:file_test check="all" check_existence="at_least_one_exists" comment="Test presence of /etc/wrlinux-release." id="oval:ssg-test_wrlinux:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_test_wrlinux:obj:1"/>
        </ns4:file_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift is version 3" id="oval:ssg-test_ocp3_atomic:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ocp3_atomic:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ocp3_atomic:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift-node is version 3" id="oval:ssg-test_ocp3_node:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ocp3_node:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ocp3_node:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift-hyperkube is version 3" id="oval:ssg-test_ocp3_hyperkube:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ocp3_hyperkube:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_ocp3_hyperkube:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="OpenStack is version 13" id="oval:ssg-test_rhosp13_release:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhosp13_release:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhosp13_release:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="rhevm4-appliance is installed" id="oval:ssg-test_rhevm4_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhevm4_version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhevm4_version:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package libuser installed" id="oval:ssg-test_env_has_libuser_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_libuser_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package nss-pam-ldapd installed" id="oval:ssg-test_env_has_nss-pam-ldapd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_nss-pam-ldapd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package pam installed" id="oval:ssg-test_env_has_pam_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_pam_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package shadow-utils installed" id="oval:ssg-test_env_has_shadow-utils_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_shadow-utils_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package systemd installed" id="oval:ssg-test_env_has_systemd_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_systemd_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package yum installed" id="oval:ssg-test_env_yumorzypper_has_yum_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_yumorzypper_has_yum_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package zypper installed" id="oval:ssg-test_env_has_zypper_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_zypper_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package yum installed" id="oval:ssg-test_env_has_yum_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_env_has_yum_installed:obj:1"/>
        </ns5:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check if /.dockerenv exists" id="oval:ssg-test_installed_env_is_a_docker_container:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_installed_env_is_a_docker_container:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check if /run/.containerenv exists" id="oval:ssg-test_installed_env_is_a_podman_container:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_installed_env_is_a_podman_container:obj:1"/>
        </ns4:file_test>
        <ns3:variable_test check="all" check_existence="at_least_one_exists" comment="Verify if Profile set Value sshd_required as not required" id="oval:ssg-test_sshd_not_required:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_not_required:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sshd_not_required:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" check_existence="at_least_one_exists" comment="Verify if Profile set Value sshd_required as required" id="oval:ssg-test_sshd_required:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_required:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sshd_required:ste:1"/>
        </ns3:variable_test>
        <ns3:variable_test check="all" check_existence="at_least_one_exists" comment="Verify if Value of sshd_required is the default" id="oval:ssg-test_sshd_requirement_unset:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_sshd_requirement_unknown:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sshd_requirement_unset:ste:1"/>
        </ns3:variable_test>
        <ns5:rpminfo_test check="all" check_existence="at_least_one_exists" comment="OpenSSH is version 7.4 or higher" id="oval:ssg-test_rpm_openssh-server_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rpm_openssh-server-version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rpm_openssh-server-version:ste:1"/>
        </ns5:rpminfo_test>
        <ns5:dpkginfo_test check="at least one" check_existence="any_exist" comment="OpenSSH is version 7.4 or higher" id="oval:ssg-test_deb_openssh-server_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_deb_openssh-server-version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_deb_openssh-server-version:ste:1"/>
        </ns5:dpkginfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Testing if /etc/sssd/sssd.conf exists" id="oval:ssg-test_sssd_conf_exists:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_sssd_conf_exists:obj:1"/>
        </ns4:file_test>
        <ns4:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_aarch_64:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_system_info_architecture_aarch_64:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_system_info_architecture_aarch_64:ste:1"/>
        </ns4:uname_test>
        <ns4:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppc_64:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_system_info_architecture_ppc_64:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_system_info_architecture_ppc_64:ste:1"/>
        </ns4:uname_test>
        <ns4:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppcle_64:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_system_info_architecture_ppcle_64:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_system_info_architecture_ppcle_64:ste:1"/>
        </ns4:uname_test>
        <ns4:uname_test check="all" comment="32 bit architecture" id="oval:ssg-test_system_info_architecture_x86:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_system_info_architecture_x86:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_system_info_architecture_x86:ste:1"/>
        </ns4:uname_test>
        <ns4:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_x86_64:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_system_info_architecture_x86_64:obj:1"/>
          <ns4:state state_ref="oval:ssg-state_system_info_architecture_x86_64:ste:1"/>
        </ns4:uname_test>
        <ns3:variable_test check="all" check_existence="at_least_one_exists" comment="Verify the existence of var_accounts_user_umask_as_number variable" id="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1"/>
        </ns3:variable_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit chmod" id="oval:ssg-test_32bit_ardm_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit chmod" id="oval:ssg-test_64bit_ardm_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit chmod" id="oval:ssg-test_32bit_ardm_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit chmod" id="oval:ssg-test_64bit_ardm_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit chown" id="oval:ssg-test_32bit_ardm_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit chown" id="oval:ssg-test_64bit_ardm_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit chown" id="oval:ssg-test_32bit_ardm_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit chown" id="oval:ssg-test_64bit_ardm_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fchmod" id="oval:ssg-test_32bit_ardm_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fchmod" id="oval:ssg-test_64bit_ardm_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fchmod" id="oval:ssg-test_32bit_ardm_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fchmod" id="oval:ssg-test_64bit_ardm_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fchmodat" id="oval:ssg-test_32bit_ardm_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fchmodat" id="oval:ssg-test_64bit_ardm_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fchmodat" id="oval:ssg-test_32bit_ardm_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fchmodat" id="oval:ssg-test_64bit_ardm_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fchown" id="oval:ssg-test_32bit_ardm_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fchown" id="oval:ssg-test_64bit_ardm_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fchown" id="oval:ssg-test_32bit_ardm_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fchown" id="oval:ssg-test_64bit_ardm_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fchownat" id="oval:ssg-test_32bit_ardm_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fchownat" id="oval:ssg-test_64bit_ardm_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fchownat" id="oval:ssg-test_32bit_ardm_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fchownat" id="oval:ssg-test_64bit_ardm_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fremovexattr" id="oval:ssg-test_32bit_ardm_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fremovexattr" id="oval:ssg-test_64bit_ardm_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fremovexattr" id="oval:ssg-test_32bit_ardm_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fremovexattr" id="oval:ssg-test_64bit_ardm_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit fsetxattr" id="oval:ssg-test_32bit_ardm_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit fsetxattr" id="oval:ssg-test_64bit_ardm_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit fsetxattr" id="oval:ssg-test_32bit_ardm_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit fsetxattr" id="oval:ssg-test_64bit_ardm_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit lchown" id="oval:ssg-test_32bit_ardm_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit lchown" id="oval:ssg-test_64bit_ardm_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit lchown" id="oval:ssg-test_32bit_ardm_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit lchown" id="oval:ssg-test_64bit_ardm_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit lremovexattr" id="oval:ssg-test_32bit_ardm_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit lremovexattr" id="oval:ssg-test_64bit_ardm_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit lremovexattr" id="oval:ssg-test_32bit_ardm_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit lremovexattr" id="oval:ssg-test_64bit_ardm_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit lsetxattr" id="oval:ssg-test_32bit_ardm_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit lsetxattr" id="oval:ssg-test_64bit_ardm_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit lsetxattr" id="oval:ssg-test_32bit_ardm_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit lsetxattr" id="oval:ssg-test_64bit_ardm_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit removexattr" id="oval:ssg-test_32bit_ardm_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit removexattr" id="oval:ssg-test_64bit_ardm_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit removexattr" id="oval:ssg-test_32bit_ardm_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit removexattr" id="oval:ssg-test_64bit_ardm_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit setxattr" id="oval:ssg-test_32bit_ardm_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit setxattr" id="oval:ssg-test_64bit_ardm_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit setxattr" id="oval:ssg-test_32bit_ardm_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_ardm_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit setxattr" id="oval:ssg-test_64bit_ardm_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_ardm_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules restorecon" id="oval:ssg-test_audit_rules_execution_restorecon_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_restorecon_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl restorecon" id="oval:ssg-test_audit_rules_execution_restorecon_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_restorecon_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl restorecon" id="oval:ssg-test_audit_rules_execution_restorecon_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_restorecon_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl restorecon" id="oval:ssg-test_audit_rules_execution_restorecon_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_restorecon_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules semanage" id="oval:ssg-test_audit_rules_execution_semanage_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_semanage_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl semanage" id="oval:ssg-test_audit_rules_execution_semanage_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_semanage_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl semanage" id="oval:ssg-test_audit_rules_execution_semanage_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_semanage_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl semanage" id="oval:ssg-test_audit_rules_execution_semanage_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_semanage_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules setfiles" id="oval:ssg-test_audit_rules_execution_setfiles_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfiles_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl setfiles" id="oval:ssg-test_audit_rules_execution_setfiles_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfiles_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setfiles" id="oval:ssg-test_audit_rules_execution_setfiles_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfiles_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setfiles" id="oval:ssg-test_audit_rules_execution_setfiles_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setfiles_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules setsebool" id="oval:ssg-test_audit_rules_execution_setsebool_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setsebool_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl setsebool" id="oval:ssg-test_audit_rules_execution_setsebool_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setsebool_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setsebool" id="oval:ssg-test_audit_rules_execution_setsebool_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setsebool_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl setsebool" id="oval:ssg-test_audit_rules_execution_setsebool_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_setsebool_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules seunshare" id="oval:ssg-test_audit_rules_execution_seunshare_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_seunshare_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl seunshare" id="oval:ssg-test_audit_rules_execution_seunshare_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_seunshare_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl seunshare" id="oval:ssg-test_audit_rules_execution_seunshare_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_seunshare_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl seunshare" id="oval:ssg-test_audit_rules_execution_seunshare_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_execution_seunshare_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules faillock" id="oval:ssg-test_arle_faillock_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_faillock_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl faillock" id="oval:ssg-test_arle_faillock_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_faillock_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules lastlog" id="oval:ssg-test_arle_lastlog_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_lastlog_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl lastlog" id="oval:ssg-test_arle_lastlog_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_lastlog_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules tallylog" id="oval:ssg-test_arle_tallylog_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_tallylog_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl tallylog" id="oval:ssg-test_arle_tallylog_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_arle_tallylog_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules at" id="oval:ssg-test_audit_rules_privileged_commands_at_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_at_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl at" id="oval:ssg-test_audit_rules_privileged_commands_at_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_at_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl at" id="oval:ssg-test_audit_rules_privileged_commands_at_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_at_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl at" id="oval:ssg-test_audit_rules_privileged_commands_at_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_at_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules crontab" id="oval:ssg-test_audit_rules_privileged_commands_crontab_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_crontab_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl crontab" id="oval:ssg-test_audit_rules_privileged_commands_crontab_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules mount" id="oval:ssg-test_audit_rules_privileged_commands_mount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_mount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl mount" id="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl mount" id="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl mount" id="oval:ssg-test_audit_rules_privileged_commands_mount_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules newgidmap" id="oval:ssg-test_audit_rules_privileged_commands_newgidmap_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgidmap_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl newgidmap" id="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newgidmap" id="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newgidmap" id="oval:ssg-test_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules newuidmap" id="oval:ssg-test_audit_rules_privileged_commands_newuidmap_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newuidmap_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl newuidmap" id="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newuidmap" id="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl newuidmap" id="oval:ssg-test_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules postdrop" id="oval:ssg-test_audit_rules_privileged_commands_postdrop_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postdrop_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl postdrop" id="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl postdrop" id="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl postdrop" id="oval:ssg-test_audit_rules_privileged_commands_postdrop_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules postqueue" id="oval:ssg-test_audit_rules_privileged_commands_postqueue_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postqueue_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl postqueue" id="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl postqueue" id="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl postqueue" id="oval:ssg-test_audit_rules_privileged_commands_postqueue_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules pt_chown" id="oval:ssg-test_audit_rules_privileged_commands_pt_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pt_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl pt_chown" id="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl pt_chown" id="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl pt_chown" id="oval:ssg-test_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules umount" id="oval:ssg-test_audit_rules_privileged_commands_umount_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_umount_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl umount" id="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl umount" id="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl umount" id="oval:ssg-test_audit_rules_privileged_commands_umount_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules userhelper" id="oval:ssg-test_audit_rules_privileged_commands_userhelper_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_userhelper_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl userhelper" id="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl userhelper" id="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl userhelper" id="oval:ssg-test_audit_rules_privileged_commands_userhelper_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit augenrules usernetctl" id="oval:ssg-test_audit_rules_privileged_commands_usernetctl_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usernetctl_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="only_one_exists" comment="audit auditctl usernetctl" id="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl usernetctl" id="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_audit_rules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_audit_rules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="audit auditctl usernetctl" id="oval:ssg-test_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_rules_d:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_rules_d:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_chmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_chmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_chmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_chmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_chown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_chown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_chown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_chown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_creat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_creat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_creat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_creat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_creat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_creat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_creat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_creat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_creat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_creat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_creat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_creat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_creat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_creat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_creat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_creat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchmod_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchmod_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchmod_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchmod_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchmodat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchmodat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchmodat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchmodat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchownat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchownat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fchownat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fchownat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_fsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_fsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_ftruncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_ftruncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_ftruncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_ftruncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_ftruncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_ftruncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_ftruncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_ftruncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_ftruncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_ftruncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_ftruncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_ftruncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_ftruncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_ftruncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_ftruncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_ftruncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lchown_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lchown_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lchown_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lchown_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lremovexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lremovexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lremovexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lremovexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lsetxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lsetxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_lsetxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_lsetxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_open_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_open_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_open_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_open_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_open_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_open_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_open_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_open_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_open_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_open_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_open_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_open_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_open_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_open_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_open_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_open_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_open_by_handle_at_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_open_by_handle_at_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_open_by_handle_at_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_open_by_handle_at_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_open_by_handle_at_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_open_by_handle_at_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_open_by_handle_at_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_open_by_handle_at_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_open_by_handle_at_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_open_by_handle_at_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_open_by_handle_at_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_open_by_handle_at_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_open_by_handle_at_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_open_by_handle_at_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_open_by_handle_at_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_open_by_handle_at_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_openat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_openat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_openat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_openat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_openat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_openat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_openat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_openat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_openat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_openat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_openat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_openat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_openat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_openat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_openat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_openat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_removexattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_removexattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_removexattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_removexattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_rename_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_rename_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_rename_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_rename_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_rename_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_rename_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_rename_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_rename_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_rename_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_rename_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_rename_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_rename_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_rename_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_rename_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_rename_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_rename_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_renameat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_renameat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_renameat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_renameat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_renameat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_renameat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_renameat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_renameat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_renameat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_renameat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_renameat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_renameat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_renameat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_renameat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_renameat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_renameat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_setxattr_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_setxattr_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_setxattr_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_setxattr_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_truncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_truncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_truncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_truncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_truncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_truncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_truncate_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_truncate_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_truncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_truncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_truncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_truncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_truncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_truncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_truncate_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_truncate_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_unlink_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_unlink_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_unlink_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_unlink_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_unlink_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_unlink_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_unlink_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_unlink_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_unlink_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_unlink_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_unlink_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_unlink_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_unlink_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_unlink_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_unlink_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_unlink_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_unlinkat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_unlinkat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_unlinkat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_unlinkat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_unlinkat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_unlinkat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit augenrules 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_unlinkat_augenrules:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_unlinkat_augenrules:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eacces" id="oval:ssg-test_32bit_arufm_eacces_unlinkat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eacces_unlinkat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 32-bit file eperm" id="oval:ssg-test_32bit_arufm_eperm_unlinkat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_32bit_arufm_eperm_unlinkat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eacces" id="oval:ssg-test_64bit_arufm_eacces_unlinkat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eacces_unlinkat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" comment="audit auditctl 64-bit file eperm" id="oval:ssg-test_64bit_arufm_eperm_unlinkat_auditctl:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_64bit_arufm_eperm_unlinkat_auditctl:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nodev" id="oval:ssg-test_nfs_nodev_etc_fstab:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_nfs_nodev_etc_fstab:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_remote_filesystem_nodev:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has noexec" id="oval:ssg-test_nfs_noexec_etc_fstab:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_nfs_noexec_etc_fstab:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_remote_filesystem_noexec:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_noexec:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_noexec:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nosuid" id="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_remote_filesystem_nosuid:ste:1"/>
        </ns3:textfilecontent54_test>
        <ns3:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1"/>
        </ns3:textfilecontent54_test>
        <ns5:rpminfo_test check="all" check_existence="none_exist" comment="package nss-pam-ldapd is removed" id="oval:ssg-test_package_nss-pam-ldapd_removed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_nss-pam-ldapd_removed:obj:1"/>
        </ns5:rpminfo_test>
        <ns5:rpminfo_test check="all" check_existence="all_exist" comment="package samba-common is installed" id="oval:ssg-test_package_samba-common_installed:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_package_samba-common_installed:obj:1"/>
        </ns5:rpminfo_test>
      </oval:tests>
      <oval:objects>
        <ns3:textfilecontent54_object comment="Banner for FTP Users" id="oval:ssg-object_test_ftp_present_banner:obj:1" version="1">
          <ns3:filepath>/etc/vsftpd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*banner_file=/etc/issue[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_root_mail_alias:obj:1" version="1">
          <ns3:filepath operation="equals">/etc/aliases</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?:[rR][oO][oO][tT]|"[rR][oO][oO][tT]")\s*:\s*(.+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_no_insecure_locks_exports:obj:1" version="2">
          <ns3:filepath>/etc/exports</ns3:filepath>
          <ns3:pattern operation="pattern match">^(.*?(\binsecure_locks\b)[^$]*)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_ntp_set_maxpoll:obj:1" version="1">
          <ns3:filepath>/etc/ntp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^server[\s]+[\S]+.*maxpoll[\s]+(\d+)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_chrony_set_maxpoll:obj:1" version="1">
          <ns3:filepath>/etc/chrony.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^server[\s]+[\S]+.*maxpoll[\s]+(\d+)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_ntp_all_server_has_maxpoll:obj:1" version="1">
          <ns3:filepath>/etc/ntp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^server[\s]+[\S]+[\s]+(.*)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_chrony_all_server_has_maxpoll:obj:1" version="1">
          <ns3:filepath>/etc/chrony.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^server[\s]+[\S]+[\s]+(.*)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="look for any shosts.equiv file on the system" id="oval:ssg-object_no_shosts_equiv_files_root:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path operation="equals">/</ns4:path>
          <ns4:filename operation="equals">shosts.equiv</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="look for any .shosts file on the system" id="oval:ssg-object_no_shosts_files_root:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path operation="equals">/</ns4:path>
          <ns4:filename operation="equals">.shosts</ns4:filename>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_20340111:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_20340112:obj:1" version="1">
          <ns3:filepath>/etc/mtab</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_snmp_default_communities:obj:1" version="1">
          <ns3:filepath>/etc/snmp/snmpd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity|createUser).*(public|private)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_snmp_versions:obj:1" version="1">
          <ns3:filepath>/etc/snmp/snmpd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_sshd_hostbasedauthentication:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)HostbasedAuthentication(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_disable_compression:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)Compression(?-i)[\s]+(no|delayed)[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)PermitEmptyPasswords(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)RhostsRSAAuthentication(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_permitrootlogin_no:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)PermitRootLogin(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)IgnoreUserKnownHosts(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_no_user_envset:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)PermitUserEnvironment(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_enable_strictmodes:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)StrictModes(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_banner_set:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)Banner(?-i)[\s]+/etc/issue[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_enable_x11_forwarding:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)X11Forwarding(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_enable_printlastlog:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)PrintLastLog(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_sshd_idle_timeout:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)ClientAliveInterval[\s]+(\d+)[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_clientalivecountmax:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)ClientAliveCountMax[\s]+([\d]+)[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_set_loglevel_info:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)LogLevel(?-i)[\s]+INFO[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_sshd_max_auth_tries:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)MaxAuthTries[\s]+(\d+)[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_use_approved_ciphers:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)Ciphers(?-i)[\s]+((aes128-ctr|aes192-ctr|aes256-ctr),?)+[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-obj_sshd_use_approved_macs:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_sshd_config_macs:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_config_macs:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)MACs(?-i)[\s]+([\w,-@]+)+[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_use_priv_separation:obj:1" version="1">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)UsePrivilegeSeparation(?-i)[\s]+(\w+)[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sshd_set_loglevel_verbose:obj:1" version="2">
          <ns3:filepath>/etc/ssh/sshd_config</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)LogLevel(?-i)[\s]+VERBOSE[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sssd_memcache_timeout:obj:1" version="1">
          <ns3:filepath>/etc/sssd/sssd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*\[nss](?:[^\n\[]*\n+)+?[\s]*memcache_timeout[\s]*=[\s]*(\d+)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_sssd_offline_cred_expiration:obj:1" version="1">
          <ns3:filepath>/etc/sssd/sssd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*\[pam](?:[^\n\[]*\n+)+?[\s]*offline_credentials_expiration[\s]*=[\s]*1$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_banner_etc_issue:obj:1" version="1">
          <ns3:filepath>/etc/issue</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1"/>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_banner_etc_motd:obj:1" version="1">
          <ns3:filepath>/etc/motd</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1"/>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_banner_gui_enabled:obj:1" version="1">
          <ns3:path>/etc/dconf/db/gdm.d/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^\[org/gnome/login-screen]([^\n]*\n+)+?banner-message-enable=true$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_prevent_user_banner_gui_enabled_change:obj:1" version="1">
          <ns3:path>/etc/dconf/db/gdm.d/locks/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^/org/gnome/login-screen/banner-message-enable$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_prevent_user_banner_change:obj:1" version="1">
          <ns3:path>/etc/dconf/db/gdm.d/locks/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^/org/gnome/login-screen/banner-message-text$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_gdm_login_banner_text_setting:obj:1" version="1">
          <ns3:path>/etc/dconf/db/gdm.d/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^banner-message-text=[\s]*'*(.*?)'$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="/etc/gdm/Xsession" id="oval:ssg-object_banner_gui_acknowledgement_file:obj:1" version="1">
          <ns4:filepath>/etc/gdm/Xsession</ns4:filepath>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_banner_gui_acknowledgement:obj:1" version="1">
          <ns3:filepath>/etc/gdm/Xsession</ns3:filepath>
          <ns3:pattern operation="pattern match">\A#!/bin/sh\n\s*if ! zenity --text-info(\\\n|(?!\n)\s)+--title "Consent"(\\\n|(?!\n)\s)+--filename=/etc/gdm/banner(\\\n|(?!\n)\s)+--no-markup(\\\n|(?!\n)\s)+--checkbox="Accept." 10 10; then\s+sleep 1[;\n]\s*exit 1[;\n]\s*fi\s</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_banner_etc_gdm_banner:obj:1" version="1">
          <ns3:filepath>/etc/gdm/banner</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1"/>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="/etc/gdm/banner" id="oval:ssg-object_banner_etc_gdm_banner_readable:obj:1" version="1">
          <ns4:filepath>/etc/gdm/banner</ns4:filepath>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_display_login_attempts:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/login</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+showfailed(\s|$)</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_display_login_attempts_silent:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/login</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+silent(\s|$)</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_faildelay:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*auth(?:(?!\n)\s)+required(?:(?!\n)\s)+pam_faildelay.so(?:(?!\n)\s[^\n]+)?(?!\n)\sdelay=([0-9]+)(?:\s|$)</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="/etc/pam.d/common-* files" id="oval:ssg-obj_pam_disable_automatic_configuration:obj:1" version="1">
          <ns4:path operation="equals">/etc/pam.d</ns4:path>
          <ns4:filename operation="pattern match">^common-.*$</ns4:filename>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_pwhistory_use_authtok:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_pwhistory.so(?:(?!\n)\s[^\n]+)?(?!\n)\suse_authtok(\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_pwhistory.so(?:(?!\n)\s[^\n]+)?(?!\n)\sremember=([0-9]+)(?:\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Get number of lines pam_unix defaults to" id="oval:ssg-object_accounts_passwords_pam_faillock_lines_value_system-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/system-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+\[.*default=([0-9]+).*\][\s]+pam_unix\.so</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Is pam_faillock not skipped?" id="oval:ssg-object_accounts_passwords_pam_faillock_when_lines_skipped_system-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/system-auth</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_preauth_default_lines_regex_system-auth:var:1"/>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Get number of lines pam_unix defaults to" id="oval:ssg-object_accounts_passwords_pam_faillock_lines_value_password-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/password-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+\[[^\]]*default=([0-9]+)[^\]]*\][\s]+pam_unix\.so</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Is pam_faillock not skipped?" id="oval:ssg-object_accounts_passwords_pam_faillock_when_lines_skipped_password-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/password-auth</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_preauth_default_lines_regex_password-auth:var:1"/>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/system-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+[^\n]*silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[^\n]+pam_unix\.so[^\n]*[\n]</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/system-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[[^\]]*default=ignore[^\]]*\]))[^\n]+pam_unix\.so(?:.*[\n])*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[^\n]+deny=([0-9]+)</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/system-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/password-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+[^\n]*silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[^\n]+pam_unix\.so[^\n]*[\n]</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/password-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[[^\]]*default=ignore[[^\]]*\]))[\s]+pam_unix\.so(?:.*[\n])*[^\n]*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[\s]+[^\n]*deny=([0-9]+)</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/password-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deny configuration of pam_tally2" id="oval:ssg-object_accounts_passwords_pam_tally2_deny_auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*auth(?:(?!\n)\s)+required(?:(?!\n)\s)+pam_tally2.so((?:(?!\n)\s)?[^\n]+)?(?:(?!\n)\s)deny=[123](\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deny configuration of pam_tally2" id="oval:ssg-object_accounts_passwords_pam_tally2_deny_account:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-account</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*account(?:(?!\n)\s)+required(?:(?!\n)\s)+pam_tally2.so((?:(?!\n)\s)?[^\n]+)?(?:(?!\n)\s)deny=[123](\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check dcredit configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_dcredit:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so((?!\n)\s[^\n]+)?(?!\n)\s+dcredit=-1(\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check difok configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_difok:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so(?:(?!\n)\s[^\n]+)?(?!\n)\s+difok=(\d+)(?:\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check lcredit configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_lcredit:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so((?!\n)\s[^\n]+)?(?!\n)\s+lcredit=-1(\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check minlen configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_minlen_line:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so(?:(?!\n)\s[^\n]+)?(?!\n)\s+minlen=(\d+)(?:\s|$)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check ocredit configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_ocredit:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so((?!\n)\s[^\n]+)?(?!\n)\s+ocredit=-1(\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check ucredit configuration of pam_cracklib" id="oval:ssg-object_cracklib_accounts_password_pam_ucredit:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*password(?:(?!\n)\s)+requisite(?:(?!\n)\s)+pam_cracklib.so((?!\n)\s[^\n]+)?(?!\n)\s+ucredit=-1(\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(ENCRYPT_METHOD\s+\w+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_encrypt_method_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_encrypt_method_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-object_pam_unix_sha512:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-password</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:sufficient))[\s]+pam_unix\.so[\s]+.*sha512.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_sha_crypt_min_rounds_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(SHA_CRYPT_MIN_ROUNDS\s+\w+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_sha_crypt_min_rounds_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_sha_crypt_min_rounds_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_sha_crypt_max_rounds_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(SHA_CRYPT_MAX_ROUNDS\s+\w+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_sha_crypt_max_rounds_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_sha_crypt_max_rounds_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_sha_crypt_min_or_max_rounds_instance_value:obj:1" version="1">
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">^[^#]*SHA_CRYPT_M(IN|AX)_ROUNDS\s</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="check /etc/pam.d/common-auth for correct settings" id="oval:ssg-object_pam_unix_sha512_auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-auth</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*auth(?:(?!\n)\s)+required(?:(?!\n)\s)+pam_unix.so((?!\n)\s[^\n]+)?(?!\n)\ssha512(\s|$)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:symlink_object comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-object_disable_ctrlaltdel_exists:obj:1" version="1">
          <ns4:filepath>/etc/systemd/system/ctrl-alt-del.target</ns4:filepath>
        </ns4:symlink_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1" version="1">
          <ns3:filepath>/etc/pam_pkcs11/pam_pkcs11.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*cert_policy[ ]=(.*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_smart_card_common_auth:obj:1" version="1">
          <ns3:filepath>/etc/pam.d/common-auth</ns3:filepath>
          <ns3:pattern datatype="string" operation="pattern match">^\s*auth\s+(?:sufficient|required)\s+pam_pkcs11.so(?:\s|$)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_pam_pkcs11_cert_policy_ca:obj:1" version="1">
          <ns3:filepath>/etc/pam_pkcs11/pam_pkcs11.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*cert_policy[ ]=\s*(.*);$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:password_object id="oval:ssg-obj_all_uids:obj:1" version="1">
          <ns4:username operation="pattern match">.*</ns4:username>
        </ns4:password_object>
        <ns3:variable_object id="oval:ssg-obj_count_of_all_uids:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_count_of_all_uids:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_default_useradd_inactive:obj:1" version="1">
          <ns3:filepath>/etc/default/useradd</ns3:filepath>
          <ns3:pattern operation="pattern match">^INACTIVE=\s*(\d+)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_passwd_content:obj:1" version="1">
          <ns3:filepath>/etc/passwd</ns3:filepath>
          <ns3:pattern operation="pattern match">^([^:]+):.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns4:shadow_object id="oval:ssg-object_account_passwords_minimum_lifetime:obj:1" version="1">
          <ns4:username operation="pattern match">.*</ns4:username>
          <oval:filter action="exclude">oval:ssg-state_account_passwords_minimum_lifetime:ste:1</oval:filter>
        </ns4:shadow_object>
        <ns4:shadow_object id="oval:ssg-object_account_passwords_maximum_lifetime:obj:1" version="1">
          <ns4:username operation="pattern match">.*</ns4:username>
        </ns4:shadow_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(PASS_MAX_DAYS\s+\d+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_pass_max_days_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_pass_max_days_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_DAYS\s+\d+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_pass_min_days_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_pass_min_days_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_LEN\s+\d+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_pass_min_len_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_pass_min_len_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(PASS_WARN_AGE\s+\d+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_last_pass_warn_age_instance_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_last_pass_warn_age_instance_value:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns4:password_object id="oval:ssg-object_accounts_password_all_shadowed:obj:1" version="1">
          <ns4:username operation="pattern match">.*</ns4:username>
        </ns4:password_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_empty_passwords:obj:1" version="1">
          <ns3:path>/etc/pam.d</ns3:path>
          <ns3:filename>.*</ns3:filename>
          <ns3:pattern operation="pattern match">\s*nullok\s*</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="look for .netrc in /home" id="oval:ssg-object_no_netrc_files_home:obj:1" version="1">
          <ns4:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/home</ns4:path>
          <ns4:filename operation="pattern match">^\.netrc$</ns4:filename>
        </ns4:file_object>
        <ns4:shadow_object id="oval:ssg-object_accounts_password_all_shadowed_sha512:obj:1" version="1">
          <ns4:username operation="pattern match">.*</ns4:username>
          <oval:filter action="exclude">oval:ssg-state_accounts_password_all_shadowed_has_no_password:ste:1</oval:filter>
          <oval:filter action="exclude">oval:ssg-state_accounts_password_all_shadowed_sha512:ste:1</oval:filter>
        </ns4:shadow_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_no_uid_except_root:obj:1" version="1">
          <ns3:filepath>/etc/passwd</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!root:)[^:]*:[^:]*:0</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="/etc/securetty file exists" id="oval:ssg-object_etc_securetty_exists:obj:1" version="1">
          <ns3:filepath>/etc/securetty</ns3:filepath>
          <ns3:pattern operation="pattern match">^.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="no entries /etc/securetty" id="oval:ssg-object_no_direct_root_logins:obj:1" version="1">
          <ns3:filepath>/etc/securetty</ns3:filepath>
          <ns3:pattern operation="pattern match">^$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n(?!#|SYS_)(UID_MIN[\s]+[\d]+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MIN[\s]+[\d]+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" version="1">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MAX[\s]+[\d]+)\s*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_passwd_entries:obj:1" version="1">
          <ns3:filepath>/etc/passwd</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!root).*:x:([\d]+):[\d]+:[^:]*:[^:]*:(?!\/sbin\/nologin|\/bin\/sync|\/sbin\/shutdown|\/sbin\/halt).*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-object_shell_defined_default_uid_range:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_default_range_quad_expr:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:variable_object id="oval:ssg-object_shell_defined_reserved_uid_range:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_reserved_range_quad_expr:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:variable_object id="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_dynalloc_range_quad_expr:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object comment="serial ports /etc/securetty" id="oval:ssg-object_serial_ports_etc_securetty:obj:1" version="1">
          <ns3:filepath>/etc/securetty</ns3:filepath>
          <ns3:pattern operation="pattern match">^ttyS[0-9]+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="virtual consoles /etc/securetty" id="oval:ssg-object_virtual_consoles_etc_securetty:obj:1" version="1">
          <ns3:filepath>/etc/securetty</ns3:filepath>
          <ns3:pattern operation="pattern match">^vc/[0-9]+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_accounts_have_homedir_login_defs:obj:1" version="2">
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)CREATE_HOME(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="FAIL_DELAY value from /etc/login.defs" id="oval:ssg-object_accounts_logon_fail_delay:obj:1" version="1">
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*(?i)FAIL_DELAY(?-i)[\s]+([^#\s]*)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1" version="1">
          <ns3:filepath>/etc/security/limits.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1" version="1">
          <ns3:path>/etc/security/limits.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1" version="1">
          <ns3:path>/etc/security/limits.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_profile_tmout:obj:1" version="2">
          <ns3:filepath>/etc/profile</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*TMOUT=(\d+)[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_etc_profiled_tmout:obj:1" version="2">
          <ns3:path>/etc/profile.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.sh$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*TMOUT=(\d+)[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:password_object id="oval:ssg-obj_user_interactive_home_defined_passwd_list:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
          <oval:filter action="include">oval:ssg-state_user_interactive_home_defined_is_interactive_user:ste:1</oval:filter>
        </ns4:password_object>
        <ns4:password_object id="oval:ssg-obj_user_interactive_home_exists_passwd_list:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
          <oval:filter action="include">oval:ssg-state_user_interactive_home_exists_is_interactive_user:ste:1</oval:filter>
        </ns4:password_object>
        <ns3:variable_object id="oval:ssg-obj_user_interactive_home_exists_home_directory_list:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_user_interactive_home_exists_home_directory_list:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns4:file_object comment="all home directories of interactive users exist" id="oval:ssg-obj_user_interactive_home_exists_home_directories:obj:1" version="1">
          <ns4:path var_check="at least one" var_ref="oval:ssg-var_user_interactive_home_exists_home_directory_list:var:1"/>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_user_interactive_home_exists_is_dir:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:password_object id="oval:ssg-obj_file_permissions_user_init_files_passwd_list:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
          <oval:filter action="include">oval:ssg-state_file_permissions_user_init_files_is_interactive_user:ste:1</oval:filter>
        </ns4:password_object>
        <ns4:file_object comment="all hidden files in home directories of interactive users exist" id="oval:ssg-obj_file_permissions_user_init_files_file_object_list:obj:1" version="1">
          <ns4:path var_check="at least one" var_ref="oval:ssg-var_file_permissions_user_init_files_home_dir_list:var:1"/>
          <ns4:filename operation="pattern match">^\.</ns4:filename>
        </ns4:file_object>
        <ns4:password_object id="oval:ssg-obj_file_permissions_home_directories_passwd_list:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
          <oval:filter action="include">oval:ssg-state_file_permissions_home_directories_is_interactive_user:ste:1</oval:filter>
        </ns4:password_object>
        <ns4:file_object comment="all home directories of interactive users exist" id="oval:ssg-obj_file_permissions_home_directories_file_object_list:obj:1" version="1">
          <ns4:path var_check="at least one" var_ref="oval:ssg-var_file_permissions_home_directories_home_dir_list:var:1"/>
          <ns4:filename xsi:nil="true"/>
        </ns4:file_object>
        <ns4:file_object comment="home directories" id="oval:ssg-object_file_permissions_home_dirs:obj:1" version="2">
          <ns4:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/home</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="exclude">oval:ssg-state_home_dirs_home_itself:ste:1</oval:filter>
          <oval:filter action="include">oval:ssg-state_home_dirs_wrong_perm:ste:1</oval:filter>
        </ns4:file_object>
        <ns3:environmentvariable58_object id="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1" version="1">
          <ns3:pid datatype="int" xsi:nil="true"/>
          <ns3:name>PATH</ns3:name>
        </ns3:environmentvariable58_object>
        <ns4:file_object comment="root's path directories with wrong group / other write permissions" id="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1" version="1">
          <ns4:path var_check="at least one" var_ref="oval:ssg-var_accounts_root_path_dirs_no_write:var:1"/>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1</oval:filter>
          <oval:filter action="exclude">oval:ssg-state_accounts_root_path_dirs_symlink:ste:1</oval:filter>
        </ns4:file_object>
        <ns3:textfilecontent54_object comment="Umask value from /etc/login.defs" id="oval:ssg-obj_umask_from_etc_login_defs:obj:1" version="1">
          <ns3:filepath>/etc/login.defs</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*UMASK[\s]+([^#\s]*)</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_etc_login_defs_umask_as_number:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group_augen:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s+]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_augen:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_augen:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_augen:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_augen:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group_augen_group:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s+]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group_auditctl_group:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_augen_gshadow:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow_auditctl_gshadow:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_augen_opasswd:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd_auditctl_opasswd:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_augen_passwd:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd_auditctl_passwd:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_augen_shadow:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow_auditctl_shadow:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+(-k[\s]+|-F[\s]+key=)\w+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/var/log/audit</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/var/log/audit</ns4:path>
          <ns4:filename operation="pattern match">^.*$</ns4:filename>
          <oval:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/var/log/audit</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all"/>
          <ns4:path operation="equals">/var/log/audit</ns4:path>
          <ns4:filename operation="pattern match">^.*$</ns4:filename>
          <oval:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="only local directories" id="oval:ssg-object_suid_binaries:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path operation="equals">/</ns4:path>
          <ns4:filename operation="pattern match">^</ns4:filename>
          <oval:filter action="exclude">oval:ssg-state_is_not_executable:ste:1</oval:filter>
          <oval:filter action="exclude">oval:ssg-state_has_no_sxid_bit:ste:1</oval:filter>
          <oval:filter action="include">oval:ssg-state_is_regular_file:ste:1</oval:filter>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privilege_function_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?:\s*(?:-w |-F path=)(\S+) (?:-p |-F perm=)(?:xwa|wxa|wax|xaw|axw|awx) (?:-k |-F key=)\w+\s*|(.).+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privilege_function_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^(?:\s*(?:-w |-F path=)(\S+) (?:-p |-F perm=)(?:xwa|wxa|wax|xaw|axw|awx) (?:-k |-F key=)\w+\s*|(.).+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_enable_syscall_audit_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+task,never[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_enable_syscall_audit_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+task,never[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_delete_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+delete_module[\s]+|([\s]+|[,])delete_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_delete_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+delete_module[\s]+|([\s]+|[,])delete_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_delete_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+delete_module[\s]+|([\s]+|[,])delete_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_delete_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+delete_module[\s]+|([\s]+|[,])delete_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_finit_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+finit_module[\s]+|([\s]+|[,])finit_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_finit_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+finit_module[\s]+|([\s]+|[,])finit_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_finit_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+finit_module[\s]+|([\s]+|[,])finit_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_finit_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+finit_module[\s]+|([\s]+|[,])finit_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_init_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+init_module[\s]+|([\s]+|[,])init_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_init_module_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+init_module[\s]+|([\s]+|[,])init_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_init_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+init_module[\s]+|([\s]+|[,])init_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_init_module_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+init_module[\s]+|([\s]+|[,])init_module([\s]+|[,]))).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_audispd_configure_remote_server:obj:1" version="1">
          <ns3:filepath>/etc/audisp/audisp-remote.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*remote_server[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_audispd_configure_disk_full_action:obj:1" version="1">
          <ns3:filepath>/etc/audisp/audisp-remote.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*disk_full_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_audispd_encrypt_sent_records:obj:1" version="1">
          <ns3:filepath>/etc/audisp/audisp-remote.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*enable_krb5[ ]+=[ ]+yes[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_audispd_configure_network_failure_action:obj:1" version="1">
          <ns3:filepath>/etc/audisp/audisp-remote.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*network_failure_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1" version="1">
          <ns3:filepath>/etc/audisp/plugins.d/syslog.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*active[ ]+=[ ]+yes[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_disk_error_action:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*disk_error_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_disk_full_action:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*disk_full_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*action_mail_acct[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*admin_space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*max_log_file[ ]+=[ ]+(\d+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*max_log_file_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_num_logs:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*num_logs[ ]+=[ ]+(\d+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_space_left:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*space_left[\s]+=[\s]+(\d+)[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_space_left_action:obj:1" version="2">
          <ns3:filepath>/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_enable_force_iommu:obj:1" version="1">
          <ns3:filepath>/etc/default/grub</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*GRUB_CMDLINE_LINUX="(.*)"$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_enable_force_iommu_default:obj:1" version="1">
          <ns3:filepath>/etc/default/grub</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*GRUB_CMDLINE_LINUX_DEFAULT="(.*)"$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_bootloader_superuser:obj:1" version="1">
          <ns3:filepath>/boot/grub2/grub.cfg</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*set[\s]+superusers=\"(?i)(?!root|admin|administrator)(?-i).*\"$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_password_usercfg:obj:1" version="1">
          <ns3:filepath>/boot/grub2/user.cfg</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*GRUB2_PASSWORD=grub\.pbkdf2\.sha512.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_password_grubcfg:obj:1" version="1">
          <ns3:filepath>/boot/grub2/grub.cfg</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*password_pbkdf2[\s]+.*[\s]+grub\.pbkdf2\.sha512.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object id="oval:ssg-object_bootloader_uefi_used:obj:1" version="1">
          <ns4:path operation="equals">/sys/firmware/efi</ns4:path>
          <ns4:filename xsi:nil="true"/>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_bootloader_uefi_superuser:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/boot/efi/EFI/(redhat|fedora)/grub.cfg$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*set[\s]+superusers=\"(?i)(?!root|admin|administrator)(?-i).*\"$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_uefi_password_usercfg:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/boot/efi/EFI/(redhat|fedora)/user.cfg$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*GRUB2_PASSWORD=grub\.pbkdf2\.sha512.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_uefi_password_grubcfg:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/boot/efi/EFI/(redhat|fedora|sles)/grub.cfg$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*password_pbkdf2[\s]+.*[\s]+grub\.pbkdf2\.sha512.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_ensure_rtc_utc_configuration:obj:1" version="1">
          <ns3:filepath>/etc/adjtime</ns3:filepath>
          <ns3:pattern operation="pattern match">^UTC$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_logrotate_conf_daily_setting:obj:1" version="2">
          <ns3:behaviors singleline="true"/>
          <ns3:filepath>/etc/logrotate.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:daily)*.*(?=[\n][\s]*daily)(.*)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
          <oval:filter action="exclude">oval:ssg-state_another_rotate_interval_after_daily:ste:1</oval:filter>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_cron_daily_logrotate_existence:obj:1" version="1">
          <ns3:filepath>/etc/cron.daily/logrotate</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*/usr/sbin/logrotate[\s\S]*/etc/logrotate.conf$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1" version="1">
          <ns3:filepath>/etc/rsyslog.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_d:obj:1" version="1">
          <ns3:path>/etc/rsyslog.d</ns3:path>
          <ns3:filename operation="pattern match">.*</ns3:filename>
          <ns3:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:interface_object id="oval:ssg-object_promisc_interfaces:obj:1" version="1">
          <ns4:name operation="pattern match">^.*$</ns4:name>
          <oval:filter action="include">oval:ssg-state_promisc:ste:1</oval:filter>
        </ns4:interface_object>
        <ns3:textfilecontent54_object comment="ipv6 disabled any modprobe conf file" id="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*options\s+ipv6\s+.*disable=1.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_wireless_disable_interfaces:obj:1" version="1">
          <ns3:filepath>/proc/net/wireless</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*[-\w]+:</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_susefirewall2_ddos_protection:obj:1" version="1">
          <ns3:filepath operation="equals">/etc/sysconfig/SuSEfirewall2</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*(?:export\s+)?FW_SERVICES_ACCEPT_EXT=(?:"([^"]+)"|'([^']+)')\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="only local directories" id="oval:ssg-object_only_local_directories:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path operation="equals">/</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_world_writable_and_not_sticky:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="system.mapfiles" id="oval:ssg-object_file_permissions_systemmap_files:obj:1" version="1">
          <ns4:path>/boot</ns4:path>
          <ns4:filename operation="pattern match">^System\.map.*$</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="all local files" id="oval:ssg-object_file_permissions_ungroupowned:obj:1" version="1">
          <ns4:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path>/</ns4:path>
          <ns4:filename operation="pattern match">.*</ns4:filename>
          <oval:filter action="exclude">oval:ssg-state_file_permissions_ungroupowned:ste:1</oval:filter>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-etc_group_object:obj:1" version="1">
          <ns3:filepath>/etc/group</ns3:filepath>
          <ns3:pattern operation="pattern match">^[^:]+:[^:]*:([\d]+):[^:]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:password_object id="oval:ssg-file_permissions_unowned_userid_list_object:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
        </ns4:password_object>
        <ns4:file_object comment="all local files" id="oval:ssg-file_permissions_unowned_object:obj:1" version="1">
          <ns4:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path>/</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="exclude">oval:ssg-file_permissions_unowned_userid_list_match:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object comment="all local directories" id="oval:ssg-all_local_directories:obj:1" version="1">
          <ns4:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local"/>
          <ns4:path operation="equals">/</ns4:path>
          <ns4:filename xsi:nil="true"/>
          <oval:filter action="include">oval:ssg-state_is_world_writable:ste:1</oval:filter>
        </ns4:file_object>
        <ns4:file_object id="oval:ssg-object_file_etc_security_opasswd:obj:1" version="1">
          <ns4:filepath>/etc/security/opasswd</ns4:filepath>
        </ns4:file_object>
        <ns5:partition_object id="oval:ssg-object_non_root_partitions:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^/\w.*$</ns5:mount_point>
          <oval:filter action="include">oval:ssg-state_local_nodev:ste:1</oval:filter>
        </ns5:partition_object>
        <ns3:textfilecontent54_object comment="look for the partition mount point in /etc/mtab" id="oval:ssg-object_configure_mount_option_var_tmp_bind_tmp:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*/tmp[\s]+/var/tmp[\s]+.*bind.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:partition_object id="oval:ssg-object_mount_option_var_tmp:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^/var/tmp$</ns5:mount_point>
        </ns5:partition_object>
        <ns3:textfilecontent54_object comment="look for the partition mount point in /etc/mtab" id="oval:ssg-object_mount_option_var_tmp_bind:obj:1" version="1">
          <ns3:filepath>/etc/mtab</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*/tmp[\s]+/var/tmp[\s]+.*bind.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:partition_object id="oval:ssg-object_mount_option_var_tmp_bind_compare_source:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^/tmp$</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-obj_nfs_nosuid_mount_points:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^.*$</ns5:mount_point>
          <oval:filter action="include">oval:ssg-state_nfs_nosuid_is_nfs:ste:1</oval:filter>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-obj_nfs_noexec_mount_points:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^.*$</ns5:mount_point>
          <oval:filter action="include">oval:ssg-state_nfs_noexec_is_nfs:ste:1</oval:filter>
        </ns5:partition_object>
        <ns4:password_object id="oval:ssg-obj_home_nosuid_interactive_users:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">.*</ns4:username>
          <oval:filter action="include">oval:ssg-state_home_nosuid_is_interactive_user:ste:1</oval:filter>
        </ns4:password_object>
        <ns4:file_object comment="File objects for every parent directory on the same mount point as any home directory" id="oval:ssg-obj_home_nosuid_home_directories:obj:1" version="1">
          <ns4:behaviors recurse="directories" recurse_direction="up" recurse_file_system="defined"/>
          <ns4:path var_check="at least one" var_ref="oval:ssg-var_home_nosuid_interactive_home_dirs:var:1"/>
          <ns4:filename xsi:nil="true"/>
        </ns4:file_object>
        <ns5:partition_object id="oval:ssg-obj_home_nosuid_mount_points:obj:1" version="1">
          <ns5:mount_point operation="pattern match">^.*$</ns5:mount_point>
          <oval:filter action="include">oval:ssg-state_home_nosuid_contains_home:ste:1</oval:filter>
        </ns5:partition_object>
        <ns4:file_object comment="system.mapfiles" id="oval:ssg-object_file_permissions_var_log_messages_files:obj:1" version="1">
          <ns4:filepath>/var/log/messages</ns4:filepath>
        </ns4:file_object>
        <ns4:password_object id="oval:ssg-obj_user_interactive_home_partition_exists_passwd_list:obj:1" version="1">
          <ns4:username datatype="string" operation="pattern match">^</ns4:username>
          <oval:filter action="include">oval:ssg-state_user_interactive_home_partition_exists_is_interactive_user:ste:1</oval:filter>
          <oval:filter action="include">oval:ssg-state_user_interactive_home_partition_exists_is_not_nobody:ste:1</oval:filter>
        </ns4:password_object>
        <ns3:variable_object id="oval:ssg-obj_user_interactive_home_parent_dirs:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_user_interactive_home_parent_dirs:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns5:partition_object comment="mount points for parent directories of home directories of interactive users" id="oval:ssg-obj_user_interactive_home_partition_exists_mount_points:obj:1" version="1">
          <ns5:mount_point var_check="at least one" var_ref="oval:ssg-var_user_interactive_home_parent_dirs:var:1"/>
        </ns5:partition_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_dconf_user_profile:obj:1" version="2">
          <ns3:filepath>/etc/dconf/profile/gdm</ns3:filepath>
          <ns3:pattern operation="pattern match">^user-db:user\nsystem-db:gdm$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_dconf_backend_config:obj:1" version="2">
          <ns3:filepath>/etc/dconf/profile/user</ns3:filepath>
          <ns3:pattern operation="pattern match">^(.*)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_disable_automatic_login:obj:1" version="1">
          <ns3:filepath>/etc/gdm/custom.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\[daemon]([^\n]*\n+)+?AutomaticLoginEnable=[Ff]alse$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_disable_gnome_ctrlaltdel:obj:1" version="1">
          <ns3:path>/etc/dconf/db/local.d/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^\[org/gnome/settings-daemon/plugins/media-keys]([^\n]*\n+)+?logout=\s*''$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_prevent_user_enable_ctrlaltdel:obj:1" version="1">
          <ns3:path>/etc/dconf/db/local.d/locks/</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^/org/gnome/settings-daemon/plugins/media-keys/logout$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-obj_linuxshield_install_antivirus:obj:1" version="1">
          <ns5:name>McAfeeVSEForLinux</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_mcafee_runtime_installed:obj:1" version="1">
          <ns5:name>MFErt</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_mcafee_management_agent:obj:1" version="1">
          <ns5:name>MFEcma</ns5:name>
        </ns5:rpminfo_object>
        <ns4:file_object comment="McAfee definition files" id="oval:ssg-mcafee_dat_files_mtime:obj:1" version="1">
          <ns4:path datatype="string">/opt/NAI/LinuxShield/engine/dat</ns4:path>
          <ns4:filename datatype="string" operation="pattern match">^.*\.dat$</ns4:filename>
        </ns4:file_object>
        <ns3:variable_object comment="McAfee AntiVirus definitions age" id="oval:ssg-object_mcafee_definitions_modified_time:obj:1" version="1">
          <ns3:var_ref>oval:ssg-variable_mcafee_dat_files_mtime:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns4:file_object id="oval:ssg-object_mcafee_accm_exists:obj:1" version="1">
          <ns4:path>/opt/McAfee/accm/bin</ns4:path>
          <ns4:filename>accm</ns4:filename>
        </ns4:file_object>
        <ns5:rpminfo_object id="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1" version="1">
          <ns5:name>MFEhiplsm</ns5:name>
        </ns5:rpminfo_object>
        <ns4:file_object id="oval:ssg-object_mcafee_auditengine_exists:obj:1" version="1">
          <ns4:path>/opt/McAfee/auditengine/bin</ns4:path>
          <ns4:filename>auditmanager</ns4:filename>
        </ns4:file_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_enable_dracut_fips_module:obj:1" version="1">
          <ns3:filepath>/etc/dracut.conf.d/40-fips.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*add_dracutmodules\+="\s*(\w*)\s*"\s*(?:|(?:#.*))?$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:variable_object id="oval:ssg-obj_system_crypto_policy_value:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_system_crypto_policy:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_crypto_fips_enabled:obj:1" version="1">
          <ns4:name>crypto.fips_enabled</ns4:name>
        </ns4:sysctl_object>
        <ns3:textfilecontent54_object comment="run aide with cron" id="oval:ssg-object_test_aide_periodic_cron_checking:obj:1" version="1">
          <ns3:filepath>/etc/crontab</ns3:filepath>
          <ns3:pattern operation="pattern match">^(([0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*)|@(hourly|daily|weekly|monthly))[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="run aide with cron" id="oval:ssg-object_test_aide_crond_checking:obj:1" version="1">
          <ns3:path>/etc/cron.d</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^(([0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*)|@(hourly|daily|weekly|monthly))[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="run aide with cron" id="oval:ssg-object_aide_var_cron_checking:obj:1" version="1">
          <ns3:filepath>/var/spool/cron/root</ns3:filepath>
          <ns3:pattern operation="pattern match">^(([0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*)|@(hourly|daily|weekly|monthly))[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="run aide with cron.(daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_checking:obj:1" version="1">
          <ns3:path operation="pattern match">^/etc/cron.(daily|weekly|monthly)$</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*/usr/sbin/aide[\s]*\-\-check.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_test_aide_scan_notification:obj:1" version="1">
          <ns3:filepath>/etc/crontab</ns3:filepath>
          <ns3:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*.+@.+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_aide_var_cron_notification:obj:1" version="1">
          <ns3:filepath>/var/spool/cron/root</ns3:filepath>
          <ns3:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*.+@.+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_notification:obj:1" version="1">
          <ns3:path operation="pattern match">^/etc/cron.(d|daily|weekly|monthly)$</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*.+@.+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_acls:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!ALLXTRAHASHES|verbose)[A-Za-z]*[\s]*=[\s]*([a-z0-9\+-]*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_ext_attributes:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!ALLXTRAHASHES)[A-Za-z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\/usr\/sbin\/auditctl\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_auditd:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/auditd\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_ausearch:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/ausearch\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_aureport:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/aureport\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_autrace:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/autrace\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_audispd:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/audispd\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_aide_verify_augenrules:obj:1" version="1">
          <ns3:filepath>/etc/aide.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^/usr/sbin/augenrules\s+([^\n]+)$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_accounts_authorized_local_users:obj:1" version="1">
          <ns3:filepath>/etc/passwd</ns3:filepath>
          <ns3:pattern operation="pattern match">^([a-zA-Z0-9_.-]+?):</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
          <oval:filter action="exclude">oval:ssg-state_default_os_user:ste:1</oval:filter>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_authenticate_etc_sudoers:obj:1" version="1">
          <ns3:filepath>/etc/sudoers</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!#).*[\s]+\!authenticate.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_authenticate_etc_sudoers_d:obj:1" version="1">
          <ns3:path>/etc/sudoers.d</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^(?!#).*[\s]+\!authenticate.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_nopasswd_etc_sudoers:obj:1" version="1">
          <ns3:filepath>/etc/sudoers</ns3:filepath>
          <ns3:pattern operation="pattern match">^(?!#).*[\s]+NOPASSWD[\s]*\:.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_nopasswd_etc_sudoers_d:obj:1" version="1">
          <ns3:path>/etc/sudoers.d</ns3:path>
          <ns3:filename operation="pattern match">^.*$</ns3:filename>
          <ns3:pattern operation="pattern match">^(?!#).*[\s]+NOPASSWD[\s]*\:.*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="solver.upgradeRemoveDroppedPackages set in /etc/zypp/zypp.conf" id="oval:ssg-object_zypp_clean_components_post_updating:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^solver.upgradeRemoveDroppedPackages\s*=\s*true\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="gpgcheck in /etc/zypp/zypp.conf not set" id="oval:ssg-object_ensure_gpgcheck_globally_unset:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*gpgcheck\s*=</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="gpgcheck activated in /etc/zypp/zypp.conf" id="oval:ssg-object_ensure_gpgcheck_globally_activated:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*gpgcheck\s*=\s*(1|on|yes|true)\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="repo_gpgcheck in /etc/zypp/zypp.conf not set" id="oval:ssg-object_ensure_repo_gpgcheck_globally_unset:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*repo_gpgcheck\s*=</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="repo_gpgcheck activated in /etc/zypp/zypp.conf" id="oval:ssg-object_ensure_repo_gpgcheck_globally_activated:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*repo_gpgcheck\s*=\s*(1|on|yes|true)\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="pkg_gpgcheck in /etc/zypp/zypp.conf not set" id="oval:ssg-object_ensure_pkg_gpgcheck_globally_unset:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*pkg_gpgcheck\s*=</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="pkg_gpgcheck activated in /etc/zypp/zypp.conf" id="oval:ssg-object_ensure_pkg_gpgcheck_globally_activated:obj:1" version="1">
          <ns3:filepath>/etc/zypp/zypp.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*pkg_gpgcheck\s*=\s*(1|on|yes|true)\s*$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="blacklist of usb-storage" id="oval:ssg-object_blacklist_d_usb-storage:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^</ns3:filename>
          <ns3:pattern operation="pattern match">^blacklist usb-storage$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="blacklist of usb-storage" id="oval:ssg-object_blacklist_f_usb-storage:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^blacklist usb-storage$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_mount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+mount[\s]+|([\s]+|[,])mount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_mount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+mount[\s]+|([\s]+|[,])mount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_mount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+mount[\s]+|([\s]+|[,])mount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_mount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+mount[\s]+|([\s]+|[,])mount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_umount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+umount[\s]+|([\s]+|[,])umount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_umount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+umount[\s]+|([\s]+|[,])umount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_umount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+umount[\s]+|([\s]+|[,])umount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_umount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+umount[\s]+|([\s]+|[,])umount([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_umount2_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+umount2[\s]+|([\s]+|[,])umount2([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_umount2_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+umount2[\s]+|([\s]+|[,])umount2([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_umount2_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+umount2[\s]+|([\s]+|[,])umount2([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_umount2_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+umount2[\s]+|([\s]+|[,])umount2([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chacl_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chacl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chacl_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chacl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chacl_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chacl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chacl_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chacl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chcon_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chcon[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chcon_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chcon[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chcon_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chcon[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chcon_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chcon[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chmod_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_chmod_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_crontab_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/crontab[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_crontab_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/crontab[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_crontab_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/crontab[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_crontab_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/crontab[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_rm_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/rm[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_rm_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/rm[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_rm_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/rm[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_rm_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/rm[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfacl_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/setfacl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfacl_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/setfacl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfacl_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/setfacl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfacl_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/setfacl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_ssh-agent_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/ssh-agent[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/ssh-agent[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/ssh-agent[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_ssh-agent_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/ssh-agent[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_faillog_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/faillog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_faillog_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/faillog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chage_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chage[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chage[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chage[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chage_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chage[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chfn_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chfn[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chfn[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chfn[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chfn_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chfn[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chsh_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chsh[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/chsh[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chsh[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_chsh_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/chsh[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_gpasswd_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/gpasswd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/gpasswd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/gpasswd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_gpasswd_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/gpasswd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_insmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/insmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/insmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/insmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_insmod_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/insmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_kmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/kmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/kmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/kmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_kmod_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/kmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_modprobe_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/modprobe[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/modprobe[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/modprobe[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_modprobe_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/modprobe[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgrp_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newgrp[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newgrp[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newgrp[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgrp_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newgrp[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/pam_timestamp_check[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/pam_timestamp_check[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/pam_timestamp_check[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pam_timestamp_check_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/pam_timestamp_check[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passmass_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/passmass[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/passmass[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/passmass[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passmass_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/passmass[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passwd_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/passwd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/passwd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/passwd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_passwd_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/passwd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_rmmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/rmmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/rmmod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/rmmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_rmmod_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/rmmod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/lib\/ssh\/ssh-keysign[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/lib\/ssh\/ssh-keysign[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/lib\/ssh\/ssh-keysign[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_ssh_keysign_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/lib\/ssh\/ssh-keysign[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_su_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/su[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_su_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/su[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_su_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/su[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_su_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/su[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudo_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/sudo[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/sudo[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/sudo[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudo_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/sudo[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudoedit_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/sudoedit[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/sudoedit[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/sudoedit[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_sudoedit_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/sudoedit[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/unix_chkpwd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/sbin\/unix_chkpwd[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/unix_chkpwd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_unix_chkpwd_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/sbin\/unix_chkpwd[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usermod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/usermod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/usermod[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/usermod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usermod_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/usermod[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns4:file_object comment="/etc/cron.allow" id="oval:ssg-object_file_groupowner_cron_allow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>cron.allow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/group" id="oval:ssg-object_file_groupowner_etc_group:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>group</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/gshadow" id="oval:ssg-object_file_groupowner_etc_gshadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>gshadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/passwd" id="oval:ssg-object_file_groupowner_etc_passwd:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>passwd</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/shadow" id="oval:ssg-object_file_groupowner_etc_shadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>shadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_groupowner_grub_conf:obj:1" version="1">
          <ns4:path>/boot/grub</ns4:path>
          <ns4:filename>grub.conf</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/cron.allow" id="oval:ssg-object_file_owner_cron_allow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>cron.allow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/group" id="oval:ssg-object_file_owner_etc_group:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>group</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/gshadow" id="oval:ssg-object_file_owner_etc_gshadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>gshadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/passwd" id="oval:ssg-object_file_owner_etc_passwd:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>passwd</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/shadow" id="oval:ssg-object_file_owner_etc_shadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>shadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_owner_grub_conf:obj:1" version="1">
          <ns4:path>/boot/grub</ns4:path>
          <ns4:filename>grub.conf</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/cron.allow" id="oval:ssg-object_file_permissions_cron_allow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>cron.allow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/group" id="oval:ssg-object_file_permissions_etc_group:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>group</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/gshadow" id="oval:ssg-object_file_permissions_etc_gshadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>gshadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/passwd" id="oval:ssg-object_file_permissions_etc_passwd:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>passwd</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/shadow" id="oval:ssg-object_file_permissions_etc_shadow:obj:1" version="1">
          <ns4:path>/etc</ns4:path>
          <ns4:filename>shadow</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_permissions_grub_conf:obj:1" version="1">
          <ns4:path>/boot/grub</ns4:path>
          <ns4:filename>grub.conf</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/httpd/conf.d/^.*$" id="oval:ssg-object_file_permissions_httpd_server_conf_d_files:obj:1" version="1">
          <ns4:path>/etc/httpd/conf.d</ns4:path>
          <ns4:filename operation="pattern match">^.*$</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/httpd/conf/^.*$" id="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1" version="1">
          <ns4:path>/etc/httpd/conf</ns4:path>
          <ns4:filename operation="pattern match">^.*$</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/httpd/conf.modules.d/^.*$" id="oval:ssg-object_file_permissions_https_server_modules_files:obj:1" version="1">
          <ns4:path>/etc/httpd/conf.modules.d</ns4:path>
          <ns4:filename operation="pattern match">^.*$</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/ssh/^.*_key$" id="oval:ssg-object_file_permissions_sshd_private_key:obj:1" version="1">
          <ns4:path>/etc/ssh</ns4:path>
          <ns4:filename operation="pattern match">^.*_key$</ns4:filename>
        </ns4:file_object>
        <ns4:file_object comment="/etc/ssh/^.*.pub$" id="oval:ssg-object_file_permissions_sshd_pub_key:obj:1" version="1">
          <ns4:path>/etc/ssh</ns4:path>
          <ns4:filename operation="pattern match">^.*.pub$</ns4:filename>
        </ns4:file_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled" id="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of bluetooth" id="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_bluetooth_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_bluetooth_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_bluetooth_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_bluetooth_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module bluetooth disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_bluetooth_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled" id="oval:ssg-obj_kernmod_cramfs_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of cramfs" id="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_cramfs_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_cramfs_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_cramfs_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_cramfs_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module cramfs disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_cramfs_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled" id="oval:ssg-obj_kernmod_dccp_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of dccp" id="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_dccp_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_dccp_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_dccp_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_dccp_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module dccp disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_dccp_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled" id="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of freevxfs" id="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_freevxfs_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_freevxfs_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_freevxfs_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_freevxfs_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module freevxfs disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_freevxfs_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled" id="oval:ssg-obj_kernmod_hfs_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of hfs" id="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_hfs_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_hfs_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_hfs_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_hfs_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfs disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_hfs_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled" id="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of hfsplus" id="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_hfsplus_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_hfsplus_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_hfsplus_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_hfsplus_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module hfsplus disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_hfsplus_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled" id="oval:ssg-obj_kernmod_jffs2_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of jffs2" id="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_jffs2_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_jffs2_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_jffs2_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_jffs2_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module jffs2 disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_jffs2_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled" id="oval:ssg-obj_kernmod_sctp_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of sctp" id="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_sctp_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_sctp_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_sctp_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_sctp_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module sctp disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_sctp_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled" id="oval:ssg-obj_kernmod_squashfs_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of squashfs" id="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_squashfs_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_squashfs_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_squashfs_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_squashfs_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module squashfs disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_squashfs_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled" id="oval:ssg-obj_kernmod_udf_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of udf" id="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_udf_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_udf_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_udf_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_udf_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module udf disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_udf_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled" id="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1" version="1">
          <ns3:path>/etc/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of usb-storage" id="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1" version="1">
          <ns3:filepath>/etc/modprobe.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled in /etc/modules-load.d" id="oval:ssg-obj_kernmod_usb-storage_etcmodules-load:obj:1" version="1">
          <ns3:path>/etc/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled in /run/modules-load.d" id="oval:ssg-obj_kernmod_usb-storage_runmodules-load:obj:1" version="1">
          <ns3:path>/run/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled in /usr/lib/modules-load.d" id="oval:ssg-obj_kernmod_usb-storage_libmodules-load:obj:1" version="1">
          <ns3:path>/usr/lib/modules-load.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled in /run/modprobe.d" id="oval:ssg-obj_kernmod_usb-storage_runmodprobed:obj:1" version="1">
          <ns3:path>/run/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="kernel module usb-storage disabled in /usr/lib/modprobe.d" id="oval:ssg-obj_kernmod_usb-storage_libmodprobed:obj:1" version="1">
          <ns3:path>/usr/lib/modprobe.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:partition_object id="oval:ssg-object_dev_shm_partition_nodev:obj:1" version="1">
          <ns5:mount_point>/dev/shm</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_dev_shm_partition_noexec:obj:1" version="1">
          <ns5:mount_point>/dev/shm</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_dev_shm_partition_nosuid:obj:1" version="1">
          <ns5:mount_point>/dev/shm</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_home_partition_nodev:obj:1" version="1">
          <ns5:mount_point>/home</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_home_partition_nosuid:obj:1" version="1">
          <ns5:mount_point>/home</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_tmp_partition_nodev:obj:1" version="1">
          <ns5:mount_point>/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_tmp_partition_noexec:obj:1" version="1">
          <ns5:mount_point>/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_tmp_partition_nosuid:obj:1" version="1">
          <ns5:mount_point>/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_var_tmp_partition_nodev:obj:1" version="1">
          <ns5:mount_point>/var/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_var_tmp_partition_noexec:obj:1" version="1">
          <ns5:mount_point>/var/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_var_tmp_partition_nosuid:obj:1" version="1">
          <ns5:mount_point>/var/tmp</ns5:mount_point>
        </ns5:partition_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_SuSEfirewall2_installed:obj:1" version="1">
          <ns5:name>SuSEfirewall2</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_abrt_removed:obj:1" version="1">
          <ns5:name>abrt</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_acpid_removed:obj:1" version="1">
          <ns5:name>acpid</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_aide_installed:obj:1" version="1">
          <ns5:name>aide</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_apparmor-parser_installed:obj:1" version="1">
          <ns5:name>apparmor-parser</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_at_removed:obj:1" version="1">
          <ns5:name>at</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_audit-audispd-plugins_installed:obj:1" version="1">
          <ns5:name>audit-audispd-plugins</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_audit_installed:obj:1" version="1">
          <ns5:name>audit</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_autofs_removed:obj:1" version="1">
          <ns5:name>autofs</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_avahi_removed:obj:1" version="1">
          <ns5:name>avahi</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_bind_removed:obj:1" version="1">
          <ns5:name>bind</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_bluez_removed:obj:1" version="1">
          <ns5:name>bluez</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_certmonger_removed:obj:1" version="1">
          <ns5:name>certmonger</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_chrony_installed:obj:1" version="1">
          <ns5:name>chrony</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_coolkey_installed:obj:1" version="1">
          <ns5:name>coolkey</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_cronie_installed:obj:1" version="1">
          <ns5:name>cronie</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_cups_removed:obj:1" version="1">
          <ns5:name>cups</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_cyrus-sasl_removed:obj:1" version="1">
          <ns5:name>cyrus-sasl</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_dbus_removed:obj:1" version="1">
          <ns5:name>dbus</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_dconf_installed:obj:1" version="1">
          <ns5:name>dconf</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_dhcp_removed:obj:1" version="1">
          <ns5:name>dhcp</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_docker_installed:obj:1" version="1">
          <ns5:name>docker</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_dovecot_removed:obj:1" version="1">
          <ns5:name>dovecot</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_esc_installed:obj:1" version="1">
          <ns5:name>esc</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_firewalld_installed:obj:1" version="1">
          <ns5:name>firewalld</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_gdm_installed:obj:1" version="1">
          <ns5:name>gdm</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_httpd_removed:obj:1" version="1">
          <ns5:name>httpd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_iputils_removed:obj:1" version="1">
          <ns5:name>iputils</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_irqbalance_installed:obj:1" version="1">
          <ns5:name>irqbalance</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_kbd_installed:obj:1" version="1">
          <ns5:name>kbd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_kernel-tools_removed:obj:1" version="1">
          <ns5:name>kernel-tools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_kexec-tools_removed:obj:1" version="1">
          <ns5:name>kexec-tools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_libcgroup-tools_removed:obj:1" version="1">
          <ns5:name>libcgroup-tools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_libcgroup_removed:obj:1" version="1">
          <ns5:name>libcgroup</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_libreswan_installed:obj:1" version="1">
          <ns5:name>libreswan</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_mdadm_removed:obj:1" version="1">
          <ns5:name>mdadm</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_mozilla-nss-tools_installed:obj:1" version="1">
          <ns5:name>mozilla-nss-tools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_mozilla-nss_installed:obj:1" version="1">
          <ns5:name>mozilla-nss</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_net-snmp_removed:obj:1" version="1">
          <ns5:name>net-snmp</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_nfs-utils_removed:obj:1" version="1">
          <ns5:name>nfs-utils</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_ntp_installed:obj:1" version="1">
          <ns5:name>ntp</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_ntp_removed:obj:1" version="1">
          <ns5:name>ntp</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_ntpdate_removed:obj:1" version="1">
          <ns5:name>ntpdate</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_oddjob_removed:obj:1" version="1">
          <ns5:name>oddjob</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_opensc_installed:obj:1" version="1">
          <ns5:name>opensc</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_openssh_installed:obj:1" version="1">
          <ns5:name>openssh</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_openssh_removed:obj:1" version="1">
          <ns5:name>openssh</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_pam_apparmor_installed:obj:1" version="1">
          <ns5:name>pam_apparmor</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_pam_pkcs11_installed:obj:1" version="1">
          <ns5:name>pam_pkcs11</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_pcsc-ccid_installed:obj:1" version="1">
          <ns5:name>pcsc-ccid</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_pcsc-lite_installed:obj:1" version="1">
          <ns5:name>pcsc-lite</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_pcsc-tools_installed:obj:1" version="1">
          <ns5:name>pcsc-tools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_policycoreutils_installed:obj:1" version="1">
          <ns5:name>policycoreutils</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_portreserve_removed:obj:1" version="1">
          <ns5:name>portreserve</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_postfix_installed:obj:1" version="1">
          <ns5:name>postfix</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_psacct_installed:obj:1" version="1">
          <ns5:name>psacct</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1" version="1">
          <ns5:name>qpid-cpp-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_quagga_removed:obj:1" version="1">
          <ns5:name>quagga</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_quota-nld_removed:obj:1" version="1">
          <ns5:name>quota-nld</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_rhnsd_removed:obj:1" version="1">
          <ns5:name>rhnsd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_rsh-server_removed:obj:1" version="1">
          <ns5:name>rsh-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_rsh_removed:obj:1" version="1">
          <ns5:name>rsh</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_rsyslog_installed:obj:1" version="1">
          <ns5:name>rsyslog</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_samba_removed:obj:1" version="1">
          <ns5:name>samba</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_screen_installed:obj:1" version="1">
          <ns5:name>screen</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_smartmontools_removed:obj:1" version="1">
          <ns5:name>smartmontools</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_squid_removed:obj:1" version="1">
          <ns5:name>squid</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_sssd_installed:obj:1" version="1">
          <ns5:name>sssd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_sssd_removed:obj:1" version="1">
          <ns5:name>sssd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_subscription-manager_removed:obj:1" version="1">
          <ns5:name>subscription-manager</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_sysstat_removed:obj:1" version="1">
          <ns5:name>sysstat</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_systemd_installed:obj:1" version="1">
          <ns5:name>systemd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_systemd_removed:obj:1" version="1">
          <ns5:name>systemd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_talk-server_removed:obj:1" version="1">
          <ns5:name>talk-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_talk_removed:obj:1" version="1">
          <ns5:name>talk</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_tcp_wrappers_installed:obj:1" version="1">
          <ns5:name>tcp_wrappers</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_telnet-server_removed:obj:1" version="1">
          <ns5:name>telnet-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_telnet_removed:obj:1" version="1">
          <ns5:name>telnet</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_tftp-server_removed:obj:1" version="1">
          <ns5:name>tftp-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_tftp_removed:obj:1" version="1">
          <ns5:name>tftp</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_vlock_installed:obj:1" version="1">
          <ns5:name>vlock</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_vsftpd_installed:obj:1" version="1">
          <ns5:name>vsftpd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_vsftpd_removed:obj:1" version="1">
          <ns5:name>vsftpd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_xinetd_installed:obj:1" version="1">
          <ns5:name>xinetd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_xinetd_removed:obj:1" version="1">
          <ns5:name>xinetd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_ypbind_removed:obj:1" version="1">
          <ns5:name>ypbind</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_ypserv_removed:obj:1" version="1">
          <ns5:name>ypserv</ns5:name>
        </ns5:rpminfo_object>
        <ns5:partition_object id="oval:ssg-object_mount_var_own_partition:obj:1" version="1">
          <ns5:mount_point>/var</ns5:mount_point>
        </ns5:partition_object>
        <ns5:partition_object id="oval:ssg-object_mount_var_log_audit_own_partition:obj:1" version="1">
          <ns5:mount_point>/var/log/audit</ns5:mount_point>
        </ns5:partition_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_SuSEfirewall2_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_SuSEfirewall2_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of SuSEfirewall2" id="oval:ssg-obj_service_running_SuSEfirewall2:obj:1" version="1">
          <ns5:unit operation="pattern match">SuSEfirewall2\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_abrtd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_abrtd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of abrtd" id="oval:ssg-obj_service_not_running_abrtd:obj:1" version="1">
          <ns5:unit operation="pattern match">abrtd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_acpid_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_acpid_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of acpid" id="oval:ssg-obj_service_not_running_acpid:obj:1" version="1">
          <ns5:unit operation="pattern match">acpid\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_apparmor_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_apparmor_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of apparmor" id="oval:ssg-obj_service_running_apparmor:obj:1" version="1">
          <ns5:unit operation="pattern match">apparmor\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_atd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_atd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of atd" id="oval:ssg-obj_service_not_running_atd:obj:1" version="1">
          <ns5:unit operation="pattern match">atd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_auditd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_auditd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of auditd" id="oval:ssg-obj_service_running_auditd:obj:1" version="1">
          <ns5:unit operation="pattern match">auditd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_autofs_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_autofs_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of autofs" id="oval:ssg-obj_service_not_running_autofs:obj:1" version="1">
          <ns5:unit operation="pattern match">autofs\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_avahi-daemon_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_avahi-daemon_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of avahi-daemon" id="oval:ssg-obj_service_not_running_avahi-daemon:obj:1" version="1">
          <ns5:unit operation="pattern match">avahi-daemon\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_bluetooth_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_bluetooth_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of bluetooth" id="oval:ssg-obj_service_not_running_bluetooth:obj:1" version="1">
          <ns5:unit operation="pattern match">bluetooth\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_certmonger_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_certmonger_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of certmonger" id="oval:ssg-obj_service_not_running_certmonger:obj:1" version="1">
          <ns5:unit operation="pattern match">certmonger\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cgconfig_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cgconfig_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of cgconfig" id="oval:ssg-obj_service_not_running_cgconfig:obj:1" version="1">
          <ns5:unit operation="pattern match">cgconfig\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cgred_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cgred_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of cgred" id="oval:ssg-obj_service_not_running_cgred:obj:1" version="1">
          <ns5:unit operation="pattern match">cgred\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_chronyd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_chronyd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of chronyd" id="oval:ssg-obj_service_running_chronyd:obj:1" version="1">
          <ns5:unit operation="pattern match">chronyd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cpupower_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cpupower_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of cpupower" id="oval:ssg-obj_service_not_running_cpupower:obj:1" version="1">
          <ns5:unit operation="pattern match">cpupower\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_crond_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_crond_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of crond" id="oval:ssg-obj_service_running_crond:obj:1" version="1">
          <ns5:unit operation="pattern match">crond\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cups_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_cups_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of cups" id="oval:ssg-obj_service_not_running_cups:obj:1" version="1">
          <ns5:unit operation="pattern match">cups\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_debug-shell_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_debug-shell_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of debug-shell" id="oval:ssg-obj_service_not_running_debug-shell:obj:1" version="1">
          <ns5:unit operation="pattern match">debug-shell\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_dhcpd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_dhcpd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of dhcpd" id="oval:ssg-obj_service_not_running_dhcpd:obj:1" version="1">
          <ns5:unit operation="pattern match">dhcpd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_docker_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_docker_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of docker" id="oval:ssg-obj_service_running_docker:obj:1" version="1">
          <ns5:unit operation="pattern match">docker\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_dovecot_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_dovecot_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of dovecot" id="oval:ssg-obj_service_not_running_dovecot:obj:1" version="1">
          <ns5:unit operation="pattern match">dovecot\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_firewalld_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_firewalld_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of firewalld" id="oval:ssg-obj_service_running_firewalld:obj:1" version="1">
          <ns5:unit operation="pattern match">firewalld\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_httpd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_httpd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of httpd" id="oval:ssg-obj_service_not_running_httpd:obj:1" version="1">
          <ns5:unit operation="pattern match">httpd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_irqbalance_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_irqbalance_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of irqbalance" id="oval:ssg-obj_service_running_irqbalance:obj:1" version="1">
          <ns5:unit operation="pattern match">irqbalance\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_kdump_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_kdump_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of kdump" id="oval:ssg-obj_service_not_running_kdump:obj:1" version="1">
          <ns5:unit operation="pattern match">kdump\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_mdmonitor_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_mdmonitor_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of mdmonitor" id="oval:ssg-obj_service_not_running_mdmonitor:obj:1" version="1">
          <ns5:unit operation="pattern match">mdmonitor\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_messagebus_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_messagebus_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of messagebus" id="oval:ssg-obj_service_not_running_messagebus:obj:1" version="1">
          <ns5:unit operation="pattern match">messagebus\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_named_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_named_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of named" id="oval:ssg-obj_service_not_running_named:obj:1" version="1">
          <ns5:unit operation="pattern match">named\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_nfs_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_nfs_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of nfs" id="oval:ssg-obj_service_not_running_nfs:obj:1" version="1">
          <ns5:unit operation="pattern match">nfs\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_nfslock_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_nfslock_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of nfslock" id="oval:ssg-obj_service_not_running_nfslock:obj:1" version="1">
          <ns5:unit operation="pattern match">nfslock\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of ntpd" id="oval:ssg-obj_service_not_running_ntpd:obj:1" version="1">
          <ns5:unit operation="pattern match">ntpd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of ntpd" id="oval:ssg-obj_service_running_ntpd:obj:1" version="1">
          <ns5:unit operation="pattern match">ntpd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpdate_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ntpdate_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of ntpdate" id="oval:ssg-obj_service_not_running_ntpdate:obj:1" version="1">
          <ns5:unit operation="pattern match">ntpdate\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_oddjobd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_oddjobd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of oddjobd" id="oval:ssg-obj_service_not_running_oddjobd:obj:1" version="1">
          <ns5:unit operation="pattern match">oddjobd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_pcscd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_pcscd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of pcscd" id="oval:ssg-obj_service_running_pcscd:obj:1" version="1">
          <ns5:unit operation="pattern match">pcscd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_portreserve_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_portreserve_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of portreserve" id="oval:ssg-obj_service_not_running_portreserve:obj:1" version="1">
          <ns5:unit operation="pattern match">portreserve\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_postfix_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_postfix_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of postfix" id="oval:ssg-obj_service_running_postfix:obj:1" version="1">
          <ns5:unit operation="pattern match">postfix\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_psacct_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_psacct_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of psacct" id="oval:ssg-obj_service_running_psacct:obj:1" version="1">
          <ns5:unit operation="pattern match">psacct\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_qpidd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_qpidd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of qpidd" id="oval:ssg-obj_service_not_running_qpidd:obj:1" version="1">
          <ns5:unit operation="pattern match">qpidd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_quota_nld_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_quota_nld_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of quota_nld" id="oval:ssg-obj_service_not_running_quota_nld:obj:1" version="1">
          <ns5:unit operation="pattern match">quota_nld\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rdisc_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rdisc_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rdisc" id="oval:ssg-obj_service_not_running_rdisc:obj:1" version="1">
          <ns5:unit operation="pattern match">rdisc\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rexec_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rexec_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rexec" id="oval:ssg-obj_service_not_running_rexec:obj:1" version="1">
          <ns5:unit operation="pattern match">rexec\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rhnsd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rhnsd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rhnsd" id="oval:ssg-obj_service_not_running_rhnsd:obj:1" version="1">
          <ns5:unit operation="pattern match">rhnsd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rhsmcertd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rhsmcertd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rhsmcertd" id="oval:ssg-obj_service_not_running_rhsmcertd:obj:1" version="1">
          <ns5:unit operation="pattern match">rhsmcertd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rlogin_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rlogin_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rlogin" id="oval:ssg-obj_service_not_running_rlogin:obj:1" version="1">
          <ns5:unit operation="pattern match">rlogin\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcbind_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcbind_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rpcbind" id="oval:ssg-obj_service_not_running_rpcbind:obj:1" version="1">
          <ns5:unit operation="pattern match">rpcbind\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcgssd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcgssd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rpcgssd" id="oval:ssg-obj_service_not_running_rpcgssd:obj:1" version="1">
          <ns5:unit operation="pattern match">rpcgssd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcidmapd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcidmapd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rpcidmapd" id="oval:ssg-obj_service_not_running_rpcidmapd:obj:1" version="1">
          <ns5:unit operation="pattern match">rpcidmapd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcsvcgssd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rpcsvcgssd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rpcsvcgssd" id="oval:ssg-obj_service_not_running_rpcsvcgssd:obj:1" version="1">
          <ns5:unit operation="pattern match">rpcsvcgssd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rsh_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rsh_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rsh" id="oval:ssg-obj_service_not_running_rsh:obj:1" version="1">
          <ns5:unit operation="pattern match">rsh\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of rsyslog" id="oval:ssg-obj_service_running_rsyslog:obj:1" version="1">
          <ns5:unit operation="pattern match">rsyslog\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_saslauthd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_saslauthd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of saslauthd" id="oval:ssg-obj_service_not_running_saslauthd:obj:1" version="1">
          <ns5:unit operation="pattern match">saslauthd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_smartd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_smartd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of smartd" id="oval:ssg-obj_service_not_running_smartd:obj:1" version="1">
          <ns5:unit operation="pattern match">smartd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_smb_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_smb_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of smb" id="oval:ssg-obj_service_not_running_smb:obj:1" version="1">
          <ns5:unit operation="pattern match">smb\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_snmpd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_snmpd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of snmpd" id="oval:ssg-obj_service_not_running_snmpd:obj:1" version="1">
          <ns5:unit operation="pattern match">snmpd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_squid_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_squid_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of squid" id="oval:ssg-obj_service_not_running_squid:obj:1" version="1">
          <ns5:unit operation="pattern match">squid\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sshd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sshd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of sshd" id="oval:ssg-obj_service_not_running_sshd:obj:1" version="1">
          <ns5:unit operation="pattern match">sshd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sshd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sshd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of sshd" id="oval:ssg-obj_service_running_sshd:obj:1" version="1">
          <ns5:unit operation="pattern match">sshd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sssd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sssd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of sssd" id="oval:ssg-obj_service_not_running_sssd:obj:1" version="1">
          <ns5:unit operation="pattern match">sssd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sssd_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sssd_socket_enabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of sssd" id="oval:ssg-obj_service_running_sssd:obj:1" version="1">
          <ns5:unit operation="pattern match">sssd\.(socket|service)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sysstat_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_sysstat_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of sysstat" id="oval:ssg-obj_service_not_running_sysstat:obj:1" version="1">
          <ns5:unit operation="pattern match">sysstat\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_telnet_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_telnet_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of telnet" id="oval:ssg-obj_service_not_running_telnet:obj:1" version="1">
          <ns5:unit operation="pattern match">telnet\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_tftp_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_tftp_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of tftp" id="oval:ssg-obj_service_not_running_tftp:obj:1" version="1">
          <ns5:unit operation="pattern match">tftp\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_vsftpd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_vsftpd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of vsftpd" id="oval:ssg-obj_service_not_running_vsftpd:obj:1" version="1">
          <ns5:unit operation="pattern match">vsftpd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_xinetd_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_xinetd_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of xinetd" id="oval:ssg-obj_service_not_running_xinetd:obj:1" version="1">
          <ns5:unit operation="pattern match">xinetd\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ypbind_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_ypbind_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of ypbind" id="oval:ssg-obj_service_not_running_ypbind:obj:1" version="1">
          <ns5:unit operation="pattern match">ypbind\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_zebra_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitdependency_object comment="list of dependencies of multi-user.target" id="oval:ssg-object_multi_user_target_for_zebra_socket_disabled:obj:1" version="1">
          <ns5:unit>multi-user.target</ns5:unit>
        </ns5:systemdunitdependency_object>
        <ns5:systemdunitproperty_object comment="Retrieve the ActiveState property of zebra" id="oval:ssg-obj_service_not_running_zebra:obj:1" version="1">
          <ns5:unit operation="pattern match">zebra\.(service|socket)</ns5:unit>
          <ns5:property>ActiveState</ns5:property>
        </ns5:systemdunitproperty_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_fs_suid_dumpable:obj:1" version="1">
          <ns4:name>fs.suid_dumpable</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_kernel_kptr_restrict:obj:1" version="1">
          <ns4:name>kernel.kptr_restrict</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_kernel_randomize_va_space:obj:1" version="1">
          <ns4:name>kernel.randomize_va_space</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.accept_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.accept_source_route</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_log_martians:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.log_martians</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_rp_filter:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.rp_filter</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.secure_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_all_send_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.all.send_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.accept_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.accept_source_route</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_log_martians:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.log_martians</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_rp_filter:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.rp_filter</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.secure_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_conf_default_send_redirects:obj:1" version="1">
          <ns4:name>net.ipv4.conf.default.send_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
          <ns4:name>net.ipv4.icmp_echo_ignore_broadcasts</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
          <ns4:name>net.ipv4.icmp_ignore_bogus_error_responses</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_ip_forward:obj:1" version="1">
          <ns4:name>net.ipv4.ip_forward</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv4_tcp_syncookies:obj:1" version="1">
          <ns4:name>net.ipv4.tcp_syncookies</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_ra:obj:1" version="1">
          <ns4:name>net.ipv6.conf.all.accept_ra</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
          <ns4:name>net.ipv6.conf.all.accept_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
          <ns4:name>net.ipv6.conf.all.accept_source_route</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:obj:1" version="1">
          <ns4:name>net.ipv6.conf.all.disable_ipv6</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_all_forwarding:obj:1" version="1">
          <ns4:name>net.ipv6.conf.all.forwarding</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_ra:obj:1" version="1">
          <ns4:name>net.ipv6.conf.default.accept_ra</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
          <ns4:name>net.ipv6.conf.default.accept_redirects</ns4:name>
        </ns4:sysctl_object>
        <ns4:sysctl_object id="oval:ssg-object_sysctl_runtime_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
          <ns4:name>net.ipv6.conf.default.accept_source_route</ns4:name>
        </ns4:sysctl_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_fs_suid_dumpable:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*fs.suid_dumpable[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_fs_suid_dumpable:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*fs.suid_dumpable[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_fs_suid_dumpable:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*fs.suid_dumpable[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_fs_suid_dumpable:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*fs.suid_dumpable[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_kernel_kptr_restrict:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*kernel.kptr_restrict[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_kernel_kptr_restrict:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.kptr_restrict[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_kernel_kptr_restrict:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.kptr_restrict[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_kernel_kptr_restrict:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.kptr_restrict[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_kernel_randomize_va_space:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*kernel.randomize_va_space[\s]*=[\s]*2[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_kernel_randomize_va_space:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.randomize_va_space[\s]*=[\s]*2[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_kernel_randomize_va_space:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.randomize_va_space[\s]*=[\s]*2[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_kernel_randomize_va_space:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*kernel.randomize_va_space[\s]*=[\s]*2[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_log_martians:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_log_martians:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_log_martians:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_log_martians:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_rp_filter:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_rp_filter:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_rp_filter:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_rp_filter:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_all_send_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_all_send_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_all_send_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_all_send_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_log_martians:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_log_martians:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_log_martians:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_log_martians:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_rp_filter:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_rp_filter:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_rp_filter:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_rp_filter:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_conf_default_send_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_conf_default_send_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_conf_default_send_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_conf_default_send_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_ip_forward:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.ip_forward[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_ip_forward:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.ip_forward[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_ip_forward:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.ip_forward[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_ip_forward:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv4.ip_forward[\s]*=[\s]*0[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv4_tcp_syncookies:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv4_tcp_syncookies:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv4_tcp_syncookies:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv4_tcp_syncookies:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_ra:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_ra:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_ra:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_ra:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_all_disable_ipv6:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv6.conf.all.disable_ipv6[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv6.conf.all.disable_ipv6[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv6.conf.all.disable_ipv6[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_disable_ipv6:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*net.ipv6.conf.all.disable_ipv6[\s]*=[\s]*1[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_all_forwarding:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_all_forwarding:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_all_forwarding:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_all_forwarding:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_ra:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_ra:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_ra:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_ra:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_sysctl_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
          <ns3:filepath>/etc/sysctl.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_etc_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/etc/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_run_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/run/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_static_usr_lib_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
          <ns3:path>/usr/lib/sysctl.d</ns3:path>
          <ns3:filename operation="pattern match">^.*\.conf$</ns3:filename>
          <ns3:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_auditctl:obj:1" version="1">
          <ns3:filepath>/usr/lib/systemd/system/auditd.service</ns3:filepath>
          <ns3:pattern operation="pattern match">^ExecStartPost=\-\/sbin\/auditctl.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_augenrules:obj:1" version="1">
          <ns3:filepath>/usr/lib/systemd/system/auditd.service</ns3:filepath>
          <ns3:pattern operation="pattern match">^ExecStartPost=\-\/sbin\/augenrules.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="log_group = root" id="oval:ssg-object_auditd_conf_log_group_root:obj:1" version="1">
          <ns3:filepath operation="equals">/etc/audit/auditd.conf</ns3:filepath>
          <ns3:pattern operation="pattern match">^[ ]*log_group[ ]+=[ ]+root[ ]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_grub2_default_exists:obj:1" version="1">
          <ns3:filepath>/etc/default/grub</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*GRUB_CMDLINE_LINUX_DEFAULT=.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-obj_centos6:obj:1" version="1">
          <ns5:name>centos-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_centos7:obj:1" version="1">
          <ns5:name>centos-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_centos8:obj:1" version="1">
          <ns5:name>centos-release</ns5:name>
        </ns5:rpminfo_object>
        <ns4:file_object comment="check /etc/debian_version file" id="oval:ssg-obj_debian:obj:1" version="1">
          <ns4:filepath>/etc/debian_version</ns4:filepath>
        </ns4:file_object>
        <ns3:textfilecontent54_object comment="Check Debian version" id="oval:ssg-obj_debian_8:obj:1" version="1">
          <ns3:filepath>/etc/debian_version</ns3:filepath>
          <ns3:pattern operation="pattern match">^8.[0-9]+$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-object_fedora_release_rpm:obj:1" version="1">
          <ns5:name>fedora-release</ns5:name>
        </ns5:rpminfo_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_fedora_vendor_product:obj:1" version="1">
          <ns3:filepath>/etc/system-release-cpe</ns3:filepath>
          <ns3:pattern operation="pattern match">^cpe:\/o:fedoraproject:fedora:[\d]+$</ns3:pattern>
          <ns3:instance datatype="int" operation="equals">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ol6_system:obj:1" version="1">
          <ns5:name>oraclelinux-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ol7_system:obj:1" version="1">
          <ns5:name>oraclelinux-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ol8_system:obj:1" version="1">
          <ns5:name>oraclelinux-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_opensuse_installed:obj:1" version="1">
          <ns5:name>openSUSE-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_opensuse_leap15_installed:obj:1" version="1">
          <ns5:name>openSUSE-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_opensuse_leap42_installed:obj:1" version="1">
          <ns5:name>openSUSE-release</ns5:name>
        </ns5:rpminfo_object>
        <ns3:family_object id="oval:ssg-object_unix_family:obj:1" version="1"/>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel_client:obj:1" version="1">
          <ns5:name>redhat-release-client</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel_workstation:obj:1" version="1">
          <ns5:name>redhat-release-workstation</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel_server:obj:1" version="1">
          <ns5:name>redhat-release-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel_computenode:obj:1" version="1">
          <ns5:name>redhat-release-computenode</ns5:name>
        </ns5:rpminfo_object>
        <ns3:family_object id="oval:ssg-obj_rhel7_unix_family:obj:1" version="1"/>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel7_client:obj:1" version="1">
          <ns5:name>redhat-release-client</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel7_workstation:obj:1" version="1">
          <ns5:name>redhat-release-workstation</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel7_server:obj:1" version="1">
          <ns5:name>redhat-release-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel7_computenode:obj:1" version="1">
          <ns5:name>redhat-release-computenode</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_redhat_release_virtualization_host_rpm:obj:1" version="1">
          <ns5:name>redhat-release-virtualization-host</ns5:name>
        </ns5:rpminfo_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_rhevh_rhel_version:obj:1" version="1">
          <ns3:filepath>/etc/redhat-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^Red Hat Enterprise Linux release (\d)\.\d+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:family_object id="oval:ssg-obj_rhel8_unix_family:obj:1" version="1"/>
        <ns5:rpminfo_object id="oval:ssg-obj_rhel8:obj:1" version="1">
          <ns5:name>redhat-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhvh4_version:obj:1" version="1">
          <ns5:name>redhat-release-virtualization-host</ns5:name>
        </ns5:rpminfo_object>
        <ns3:textfilecontent54_object id="oval:ssg-obj_rhelh4_version:obj:1" version="1">
          <ns3:filepath>/etc/redhat-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^Red Hat Enterprise Linux release (\d)\.\d+$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sl6:obj:1" version="1">
          <ns5:name>sl-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sl7:obj:1" version="1">
          <ns5:name>sl-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sl8:obj:1" version="1">
          <ns5:name>sl-release</ns5:name>
        </ns5:rpminfo_object>
        <ns3:family_object id="oval:ssg-obj_sle11_unix_family:obj:1" version="1"/>
        <ns5:rpminfo_object id="oval:ssg-obj_sle11_desktop:obj:1" version="1">
          <ns5:name>sled-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sle11_server:obj:1" version="1">
          <ns5:name>sles-release</ns5:name>
        </ns5:rpminfo_object>
        <ns3:family_object id="oval:ssg-obj_sle12_unix_family:obj:1" version="1"/>
        <ns5:rpminfo_object id="oval:ssg-obj_sle12_desktop:obj:1" version="1">
          <ns5:name>sled-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sle12_server:obj:1" version="1">
          <ns5:name>sles-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_sle12_sap:obj:1" version="1">
          <ns5:name>SLES_SAP-release</ns5:name>
        </ns5:rpminfo_object>
        <ns4:file_object comment="check /etc/lsb-release file" id="oval:ssg-obj_lsb:obj:1" version="1">
          <ns4:filepath>/etc/lsb-release</ns4:filepath>
        </ns4:file_object>
        <ns3:textfilecontent54_object comment="Check Ubuntu" id="oval:ssg-obj_ubuntu:obj:1" version="1">
          <ns3:filepath>/etc/lsb-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^DISTRIB_ID=Ubuntu$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_trusty:obj:1" version="1">
          <ns3:filepath>/etc/lsb-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^DISTRIB_CODENAME=trusty$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_xenial:obj:1" version="1">
          <ns3:filepath>/etc/lsb-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^DISTRIB_CODENAME=xenial$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_bionic:obj:1" version="1">
          <ns3:filepath>/etc/lsb-release</ns3:filepath>
          <ns3:pattern operation="pattern match">^DISTRIB_CODENAME=bionic$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:family_object id="oval:ssg-obj_unix_wrlinux:obj:1" version="1"/>
        <ns4:file_object id="oval:ssg-obj_test_wrlinux:obj:1" version="1">
          <ns4:filepath>/etc/wrlinux-release</ns4:filepath>
        </ns4:file_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ocp3_atomic:obj:1" version="1">
          <ns5:name>atomic-openshift</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ocp3_node:obj:1" version="1">
          <ns5:name>atomic-openshift-node</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_ocp3_hyperkube:obj:1" version="1">
          <ns5:name>atomic-openshift-hyperkube</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhosp13_release:obj:1" version="1">
          <ns5:name>rhosp-release</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rhevm4_version:obj:1" version="1">
          <ns5:name>rhvm-appliance</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_libuser_installed:obj:1" version="1">
          <ns5:name>libuser</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_nss-pam-ldapd_installed:obj:1" version="1">
          <ns5:name>nss-pam-ldapd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_pam_installed:obj:1" version="1">
          <ns5:name>pam</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_shadow-utils_installed:obj:1" version="1">
          <ns5:name>shadow-utils</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_systemd_installed:obj:1" version="1">
          <ns5:name>systemd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_yumorzypper_has_yum_installed:obj:1" version="1">
          <ns5:name>yum</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_zypper_installed:obj:1" version="1">
          <ns5:name>zypper</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_env_has_yum_installed:obj:1" version="1">
          <ns5:name>yum</ns5:name>
        </ns5:rpminfo_object>
        <ns4:file_object comment="Check file /.dockerenv" id="oval:ssg-object_installed_env_is_a_docker_container:obj:1" version="1">
          <ns4:filepath datatype="string">/.dockerenv</ns4:filepath>
        </ns4:file_object>
        <ns4:file_object comment="Check file /run/.containerenv" id="oval:ssg-object_installed_env_is_a_podman_container:obj:1" version="1">
          <ns4:filepath datatype="string">/run/.containerenv</ns4:filepath>
        </ns4:file_object>
        <ns3:variable_object id="oval:ssg-object_sshd_not_required:obj:1" version="1">
          <ns3:var_ref>oval:ssg-sshd_required:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:variable_object id="oval:ssg-object_sshd_required:obj:1" version="1">
          <ns3:var_ref>oval:ssg-sshd_required:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:variable_object id="oval:ssg-object_sshd_requirement_unknown:obj:1" version="1">
          <ns3:var_ref>oval:ssg-sshd_required:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns5:rpminfo_object id="oval:ssg-obj_rpm_openssh-server-version:obj:1" version="1">
          <ns5:name>openssh-server</ns5:name>
        </ns5:rpminfo_object>
        <ns5:dpkginfo_object id="oval:ssg-obj_deb_openssh-server-version:obj:1" version="1">
          <ns5:name>openssh-server</ns5:name>
        </ns5:dpkginfo_object>
        <ns4:file_object comment="/etc/sssd/sssd.conf" id="oval:ssg-object_sssd_conf_exists:obj:1" version="1">
          <ns4:filepath>/etc/sssd/sssd.conf</ns4:filepath>
        </ns4:file_object>
        <ns4:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_aarch_64:obj:1" version="1"/>
        <ns4:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppc_64:obj:1" version="1"/>
        <ns4:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppcle_64:obj:1" version="1"/>
        <ns4:uname_object comment="32 bit architecture" id="oval:ssg-object_system_info_architecture_x86:obj:1" version="1"/>
        <ns4:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_x86_64:obj:1" version="1"/>
        <ns3:variable_object id="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1" version="1">
          <ns3:var_ref>oval:ssg-var_accounts_user_umask_umask_as_number:var:1</ns3:var_ref>
        </ns3:variable_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+chmod[\s]+|([\s]+|[,])chmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+chmod[\s]+|([\s]+|[,])chmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+chmod[\s]+|([\s]+|[,])chmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+chmod[\s]+|([\s]+|[,])chmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+chown[\s]+|([\s]+|[,])chown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+chown[\s]+|([\s]+|[,])chown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+chown[\s]+|([\s]+|[,])chown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+chown[\s]+|([\s]+|[,])chown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchmod[\s]+|([\s]+|[,])fchmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchmod[\s]+|([\s]+|[,])fchmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchmod[\s]+|([\s]+|[,])fchmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchmod[\s]+|([\s]+|[,])fchmod([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchmodat[\s]+|([\s]+|[,])fchmodat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchmodat[\s]+|([\s]+|[,])fchmodat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchmodat[\s]+|([\s]+|[,])fchmodat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchmodat[\s]+|([\s]+|[,])fchmodat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchown[\s]+|([\s]+|[,])fchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchown[\s]+|([\s]+|[,])fchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchown[\s]+|([\s]+|[,])fchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchown[\s]+|([\s]+|[,])fchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchownat[\s]+|([\s]+|[,])fchownat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchownat[\s]+|([\s]+|[,])fchownat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fchownat[\s]+|([\s]+|[,])fchownat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fchownat[\s]+|([\s]+|[,])fchownat([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fremovexattr[\s]+|([\s]+|[,])fremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fremovexattr[\s]+|([\s]+|[,])fremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fremovexattr[\s]+|([\s]+|[,])fremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fremovexattr[\s]+|([\s]+|[,])fremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fsetxattr[\s]+|([\s]+|[,])fsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fsetxattr[\s]+|([\s]+|[,])fsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+fsetxattr[\s]+|([\s]+|[,])fsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+fsetxattr[\s]+|([\s]+|[,])fsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lchown[\s]+|([\s]+|[,])lchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lchown[\s]+|([\s]+|[,])lchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lchown[\s]+|([\s]+|[,])lchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lchown[\s]+|([\s]+|[,])lchown([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lremovexattr[\s]+|([\s]+|[,])lremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lremovexattr[\s]+|([\s]+|[,])lremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lremovexattr[\s]+|([\s]+|[,])lremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lremovexattr[\s]+|([\s]+|[,])lremovexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lsetxattr[\s]+|([\s]+|[,])lsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lsetxattr[\s]+|([\s]+|[,])lsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+lsetxattr[\s]+|([\s]+|[,])lsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+lsetxattr[\s]+|([\s]+|[,])lsetxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+removexattr[\s]+|([\s]+|[,])removexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+removexattr[\s]+|([\s]+|[,])removexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+removexattr[\s]+|([\s]+|[,])removexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+removexattr[\s]+|([\s]+|[,])removexattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+setxattr[\s]+|([\s]+|[,])setxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+setxattr[\s]+|([\s]+|[,])setxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_ardm_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*(-S[\s]+setxattr[\s]+|([\s]+|[,])setxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_ardm_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*(-S[\s]+setxattr[\s]+|([\s]+|[,])setxattr([\s]+|[,])))(?:.*-F\s+auid&gt;=1000[\s]+)(?:.*-F\s+auid!=(?:4294967295|unset)[\s]+).*(-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_restorecon_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/restorecon[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_restorecon_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/restorecon[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_restorecon_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/restorecon[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_restorecon_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/restorecon[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_semanage_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/semanage[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_semanage_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/semanage[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_semanage_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/semanage[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_semanage_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/semanage[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfiles_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/setfiles[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfiles_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/setfiles[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfiles_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/setfiles[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setfiles_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/setfiles[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setsebool_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/setsebool[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setsebool_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/setsebool[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setsebool_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/setsebool[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_setsebool_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/setsebool[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_seunshare_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/seunshare[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_seunshare_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/seunshare[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_seunshare_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/seunshare[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_execution_seunshare_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/seunshare[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_faillock_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/run\/faillock\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_faillock_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/run\/faillock\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_lastlog_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/lastlog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_lastlog_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/lastlog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_tallylog_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/tallylog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_arle_tallylog_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^\-w\s+\/var\/log\/tallylog\s+\-p\s+wa\s+(-k[\s]+|-F[\s]+key=)[-\w]+\s*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_at_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/at[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_at_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/at[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_at_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/at[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_at_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/at[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_crontab_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/crontab[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/crontab[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/crontab[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_crontab_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/crontab[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_mount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/mount[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/mount[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/mount[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_mount_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/mount[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgidmap_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newgidmap[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newgidmap[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newgidmap[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newgidmap_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newgidmap[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newuidmap_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newuidmap[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/newuidmap[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newuidmap[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_newuidmap_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/newuidmap[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postdrop_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/postdrop[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/postdrop[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/postdrop[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postdrop_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/postdrop[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postqueue_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/postqueue[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/postqueue[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/postqueue[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_postqueue_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/postqueue[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pt_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/libexec\/pt_chown[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/libexec\/pt_chown[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/libexec\/pt_chown[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_pt_chown_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/libexec\/pt_chown[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_umount_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/umount[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/bin\/umount[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/umount[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_umount_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/bin\/umount[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_userhelper_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/userhelper[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/userhelper[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/userhelper[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_userhelper_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/userhelper[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usernetctl_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/usernetctl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+path=\/usr\/sbin\/usernetctl[\s]+-F[\s]+perm=x[\s]+-F[\s]+auid&gt;=1000[\s]+-F[\s]+auid!=(?:4294967295|unset)[\s]+(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int" operation="greater than or equal">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_audit_rules:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/usernetctl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands_usernetctl_auditctl_fsrule_rules_d:obj:1" version="1">
          <ns3:path>/etc/audit/rules.d</ns3:path>
          <ns3:filename operation="pattern match">\.rules$</ns3:filename>
          <ns3:pattern operation="pattern match">^[\s]*-w[\s]+\/usr\/sbin\/usernetctl[\s]+-p[\s]+[\S]*x[\S]*[\s]+-k[\s]+[\S]+[\s]*$</ns3:pattern>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_chmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_chmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_chmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_chown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_chown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_chown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_creat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_creat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_creat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_creat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_creat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_creat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_creat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_creat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_creat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchmod_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchmod_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchmod_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchmodat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchmodat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchmodat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchownat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fchownat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fchownat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_fsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_fsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_ftruncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_ftruncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_ftruncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_ftruncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_ftruncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_ftruncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_ftruncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_ftruncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_ftruncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lchown_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lchown_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lchown_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lremovexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lremovexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lremovexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lsetxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_lsetxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_lsetxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_open_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_open_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_open_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_open_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_open_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_open_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_open_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_open_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_open_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_open_by_handle_at_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_open_by_handle_at_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_open_by_handle_at_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_open_by_handle_at_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_open_by_handle_at_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_open_by_handle_at_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_open_by_handle_at_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_open_by_handle_at_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_open_by_handle_at_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_openat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_openat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_openat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_openat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_openat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_openat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_openat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_openat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_openat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_removexattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_removexattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_removexattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_rename_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_rename_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_rename_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_rename_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_rename_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_rename_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_rename_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_rename_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_rename_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_renameat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_renameat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_renameat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_renameat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_renameat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_renameat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_renameat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_renameat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_renameat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_setxattr_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_setxattr_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_setxattr_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_truncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_truncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_truncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_truncate_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_truncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_truncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_truncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_truncate_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_truncate_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_unlink_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_unlink_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_unlink_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_unlink_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_unlink_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_unlink_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_unlink_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_unlink_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_unlink_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_unlinkat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_unlinkat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_unlinkat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_unlinkat_augenrules:obj:1" version="1">
          <ns3:filepath operation="pattern match">^/etc/audit/rules\.d/.*\.rules$</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eacces_unlinkat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eacces_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_32bit_arufm_eperm_unlinkat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_32bit_arufm_eperm_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eacces_unlinkat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eacces_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_64bit_arufm_eperm_unlinkat_auditctl:obj:1" version="1">
          <ns3:filepath>/etc/audit/audit.rules</ns3:filepath>
          <ns3:pattern operation="pattern match" var_ref="oval:ssg-var_64bit_arufm_eperm_unlinkat_regex:var:1"/>
          <ns3:instance datatype="int">1</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_nfs_nodev_etc_fstab:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_nfs_noexec_etc_fstab:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_noexec:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns3:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1" version="1">
          <ns3:filepath>/etc/fstab</ns3:filepath>
          <ns3:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns3:pattern>
          <ns3:instance datatype="int" operation="not equal">0</ns3:instance>
        </ns3:textfilecontent54_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_nss-pam-ldapd_removed:obj:1" version="1">
          <ns5:name>nss-pam-ldapd</ns5:name>
        </ns5:rpminfo_object>
        <ns5:rpminfo_object id="oval:ssg-obj_package_samba-common_installed:obj:1" version="1">
          <ns5:name>samba-common</ns5:name>
        </ns5:rpminfo_object>
      </oval:objects>
      <oval:states>
        <ns3:textfilecontent54_state comment="root email alias" id="oval:ssg-state_root_mail_alias:ste:1" version="1">
          <ns3:subexpression operation="equals" var_check="all" var_ref="oval:ssg-var_postfix_root_mail_alias:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_time_service_set_maxpoll:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_time_service_set_maxpoll:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_server_has_maxpoll:ste:1" version="1">
          <ns3:subexpression datatype="string" operation="pattern match">maxpoll \d+</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_20340112:ste:1" version="1">
          <ns3:instance datatype="int">2</ns3:instance>
          <ns3:subexpression operation="pattern match">sec=(krb5i|ntlmv2i)</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="upper bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_upper_bound:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-sshd_idle_timeout_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="lower bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_lower_bound:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than">0</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_sshd_clientalivecountmax:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-sshd_max_auth_tries_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="upper bound of MaxAuthTries" id="oval:ssg-state_maxauthtries_value_upper_bound:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-sshd_max_auth_tries_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="lower bound of MaxAuthTries" id="oval:ssg-state_maxauthtries_value_lower_bound:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than">0</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:variable_state comment="approved macs" id="oval:ssg-ste_sshd_use_approved_macs:ste:1" version="1">
          <ns3:value datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_sshd_approved_macs:var:1"/>
        </ns3:variable_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_sshd_use_priv_separation:ste:1" version="1">
          <ns3:subexpression operation="equals" var_ref="oval:ssg-var_sshd_priv_separation:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="value of memcache_timeout setting" id="oval:ssg-state_sssd_memcache_timeout:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-var_sssd_memcache_timeout:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_gdm_login_banner_text_setting:ste:1" version="1">
          <ns3:subexpression datatype="string" operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1"/>
        </ns3:textfilecontent54_state>
        <ns4:file_state id="oval:ssg-state_banner_gui_acknowledgement_file:ste:1" version="1">
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uexec datatype="boolean">true</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">true</ns4:gexec>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">true</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_banner_etc_gdm_banner_readable:ste:1" version="1">
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:oread datatype="boolean">true</ns4:oread>
        </ns4:file_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_faildelay:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_faildelay_us:var:1"/>
        </ns3:textfilecontent54_state>
        <ns4:file_state id="oval:ssg-state_pam_disable_automatic_configuration_no_symlink:ste:1" version="1">
          <ns4:type>regular</ns4:type>
        </ns4:file_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_accounts_password_pam_pwhistory_remember:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_unix_remember:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_difok:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_difok:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_minlen:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_minlen:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:variable_state id="oval:ssg-state_last_encrypt_method_instance_value:ste:1" version="1">
          <ns3:value datatype="string" operation="equals">SHA512</ns3:value>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_last_sha_crypt_rounds_instance_value:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than or equal">5000</ns3:value>
        </ns3:variable_state>
        <ns4:symlink_state comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-state_disable_ctrlaltdel_exists:ste:1" version="1">
          <ns4:filepath>/etc/systemd/system/ctrl-alt-del.target</ns4:filepath>
          <ns4:canonical_path>/dev/null</ns4:canonical_path>
        </ns4:symlink_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*ocsp_on.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_pam_pkcs11_cert_policy_ca:ste:1" version="1">
          <ns3:subexpression operation="pattern match">(^|,\s*)ca(\s*,|$)</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:variable_state id="oval:ssg-state_no_duplicate_uids:ste:1" version="1">
          <ns3:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_count_of_unique_uids:var:1"/>
        </ns3:variable_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_account_disable_post_pw_expiration:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than">-1</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:variable_state id="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1" version="1">
          <ns3:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1"/>
        </ns3:variable_state>
        <ns4:shadow_state id="oval:ssg-state_account_passwords_minimum_lifetime:ste:1" version="1">
          <ns4:chg_allow datatype="int" operation="not equal">0</ns4:chg_allow>
        </ns4:shadow_state>
        <ns4:shadow_state id="oval:ssg-state_account_passwords_maximum_lifetime:ste:1" version="1">
          <ns4:chg_req datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_maximum_age_login_defs:var:1"/>
        </ns4:shadow_state>
        <ns3:variable_state id="oval:ssg-state_last_pass_max_days_instance_value:ste:1" version="1">
          <ns3:value datatype="int" operation="less than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_maximum_age_login_defs:var:1"/>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_last_pass_min_days_instance_value:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_minimum_age_login_defs:var:1"/>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_last_pass_min_len_instance_value:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_minlen_login_defs:var:1"/>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_last_pass_warn_age_instance_value:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_warn_age_login_defs:var:1"/>
        </ns3:variable_state>
        <ns4:password_state id="oval:ssg-state_accounts_password_all_shadowed:ste:1" version="1">
          <ns4:password operation="pattern match">x|\*</ns4:password>
        </ns4:password_state>
        <ns4:shadow_state id="oval:ssg-state_accounts_password_all_shadowed_has_no_password:ste:1" version="1">
          <ns4:password operation="pattern match">^(!|!!|\*)$</ns4:password>
        </ns4:shadow_state>
        <ns4:shadow_state id="oval:ssg-state_accounts_password_all_shadowed_sha512:ste:1" version="1">
          <ns4:encrypt_method operation="equals">SHA-512</ns4:encrypt_method>
        </ns4:shadow_state>
        <ns3:variable_state id="oval:ssg-state_shell_defined_default_uid_range:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than">0</ns3:value>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_shell_defined_reserved_uid_range:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than">0</ns3:value>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1" version="1">
          <ns3:value datatype="int" operation="greater than">0</ns3:value>
        </ns3:variable_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_accounts_logon_fail_delay:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_accounts_fail_delay:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_maxlogins:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_etc_profile_tmout:ste:1" version="2">
          <ns3:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-var_accounts_tmout:var:1"/>
        </ns3:textfilecontent54_state>
        <ns4:password_state id="oval:ssg-state_user_interactive_home_defined_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns4:password_state id="oval:ssg-state_user_interactive_home_defined_has_home_dir:ste:1" version="1">
          <ns4:home_dir datatype="string" operation="pattern match">^/.</ns4:home_dir>
        </ns4:password_state>
        <ns4:password_state id="oval:ssg-state_user_interactive_home_exists_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns4:file_state id="oval:ssg-state_user_interactive_home_exists_is_dir:ste:1" version="1">
          <ns4:type>directory</ns4:type>
        </ns4:file_state>
        <ns3:variable_state id="oval:ssg-state_user_interactive_home_exists_each_home_has_file_object:ste:1" version="1">
          <ns3:value datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_user_interactive_home_exists_file_objects:var:1"/>
        </ns3:variable_state>
        <ns4:password_state id="oval:ssg-state_file_permissions_user_init_files_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_user_init_files_group_permissions:ste:1" version="1">
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_user_init_files_other_permissions:ste:1" version="1">
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:password_state id="oval:ssg-state_file_permissions_home_directories_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_home_directories_group_permissions:ste:1" version="1">
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_home_directories_other_permissions:ste:1" version="1">
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_home_dirs_home_itself:ste:1" version="1">
          <ns4:path operation="equals">/home</ns4:path>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_home_dirs_wrong_perm:ste:1" operator="OR" version="1">
          <ns4:suid datatype="boolean">true</ns4:suid>
          <ns4:sgid datatype="boolean">true</ns4:sgid>
          <ns4:sticky datatype="boolean">true</ns4:sticky>
          <ns4:gwrite datatype="boolean">true</ns4:gwrite>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">true</ns4:owrite>
          <ns4:oexec datatype="boolean">true</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state comment="group or other has write privilege" id="oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1" operator="OR" version="1">
          <ns4:gwrite datatype="boolean">true</ns4:gwrite>
          <ns4:owrite datatype="boolean">true</ns4:owrite>
        </ns4:file_state>
        <ns4:file_state comment="symbolic link" id="oval:ssg-state_accounts_root_path_dirs_symlink:ste:1" version="1">
          <ns4:type operation="equals">symbolic link</ns4:type>
        </ns4:file_state>
        <ns3:variable_state id="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1" version="1">
          <ns3:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1"/>
        </ns3:variable_state>
        <ns4:file_state id="oval:ssg-state_owner_not_root_root_var_log_audit:ste:1" operator="OR" version="1">
          <ns4:group_id datatype="int" operation="not equal">0</ns4:group_id>
          <ns4:user_id datatype="int" operation="not equal">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1" operator="OR" version="1">
          <ns4:group_id datatype="int" operation="not equal">0</ns4:group_id>
          <ns4:user_id datatype="int" operation="equals">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state comment="checks that a file is executable" id="oval:ssg-state_is_not_executable:ste:1" version="1">
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state comment="checks for set-gid on regular files" id="oval:ssg-state_has_no_sxid_bit:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
        </ns4:file_state>
        <ns4:file_state comment="checks for set-gid on regular files" id="oval:ssg-state_is_regular_file:ste:1" version="1">
          <ns4:type>regular</ns4:type>
        </ns4:file_state>
        <ns4:file_state comment="checks for an audit rule in /etc/audit/audit.rules for a file" id="oval:ssg-state_has_audit_rule_audit_rules:ste:1" version="1">
          <ns4:filepath operation="equals" var_check="at least one" var_ref="oval:ssg-var_audit_rules_privilege_function_audit_rules:var:1"/>
        </ns4:file_state>
        <ns4:file_state comment="checks for an audit rule in /etc/audit/rules.d for a file" id="oval:ssg-state_has_audit_rule_rules_d:ste:1" version="1">
          <ns4:filepath operation="equals" var_check="at least one" var_ref="oval:ssg-var_audit_rules_privilege_function_rules_d:var:1"/>
        </ns4:file_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_audispd_configure_remote_server:ste:1" version="1">
          <ns3:subexpression operation="equals" var_ref="oval:ssg-var_audispd_remote_server:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_audispd_configure_disk_full_action:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^(?:single|syslog|halt)$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_audispd_configure_network_failure_action:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^(?:single|syslog|halt)$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_disk_error_action:ste:1" version="1">
          <ns3:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_disk_error_action:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_disk_full_action:ste:1" version="1">
          <ns3:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_disk_full_action:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1" version="1">
          <ns3:subexpression operation="equals" var_ref="oval:ssg-var_auditd_action_mail_acct:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1" version="1">
          <ns3:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_admin_space_left_action:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_max_log_file:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1" version="1">
          <ns3:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_max_log_file_action:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_num_logs:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_num_logs:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_space_left:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_space_left:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_space_left_action:ste:1" version="2">
          <ns3:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_space_left_action:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_grub2_enable_force_iommu:ste:1" version="1">
          <ns3:subexpression datatype="string" operation="pattern match">^.*iommu=force.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_another_rotate_interval_after_daily:ste:1" version="1">
          <ns3:subexpression datatype="string" operation="pattern match">}[^{]+[\n][\s]*(weekly|monthly|yearly)|[\n][\s]*(weekly|monthly|yearly)[^}]+{</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns4:interface_state id="oval:ssg-state_promisc:ste:1" version="1">
          <ns4:flag datatype="string" entity_check="at least one" operation="equals">PROMISC</ns4:flag>
        </ns4:interface_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_susefirewall2_ddos_protection_hitcount:ste:1" version="1">
          <ns3:subexpression operation="pattern match">(^| )0/0,tcp,22,,([^ $]+,)?hitcount=\d+(,|$)</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_susefirewall2_ddos_protection_blockseconds:ste:1" version="1">
          <ns3:subexpression operation="pattern match">(^| )0/0,tcp,22,,([^ $]+,)?blockseconds=\d+(,|$)</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns4:file_state id="oval:ssg-state_world_writable_and_not_sticky:ste:1" version="1">
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:owrite datatype="boolean">true</ns4:owrite>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_owner_systemmap:ste:1" version="1">
          <ns4:user_id datatype="int" operation="equals">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_systemmap:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">false</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state comment="Files that are owned by a group." id="oval:ssg-state_file_permissions_ungroupowned:ste:1" version="1">
          <ns4:group_id datatype="int" var_check="at least one" var_ref="oval:ssg-variable_file_permissions_ungroupowned:var:1"/>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-file_permissions_unowned_userid_list_match:ste:1" version="1">
          <ns4:user_id datatype="int" var_check="at least one" var_ref="oval:ssg-file_permissions_unowned_userid_list:var:1"/>
        </ns4:file_state>
        <ns4:file_state comment="is world writable" id="oval:ssg-state_is_world_writable:ste:1" version="1">
          <ns4:owrite datatype="boolean">true</ns4:owrite>
        </ns4:file_state>
        <ns4:file_state comment="gid greater than or equal to 1000" id="oval:ssg-state_gid_is_interactive:ste:1" version="1">
          <ns4:group_id datatype="int" operation="greater than or equal">1000</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_etc_security_opasswd:ste:1" version="1">
          <ns4:user_id datatype="int" operation="equals">0</ns4:user_id>
          <ns4:suid datatype="boolean" operation="equals">0</ns4:suid>
          <ns4:sticky datatype="boolean" operation="equals">0</ns4:sticky>
          <ns4:uread datatype="boolean" operation="equals">1</ns4:uread>
          <ns4:uwrite datatype="boolean" operation="equals">1</ns4:uwrite>
          <ns4:uexec datatype="boolean" operation="equals">0</ns4:uexec>
          <ns4:oread datatype="boolean" operation="equals">0</ns4:oread>
          <ns4:owrite datatype="boolean" operation="equals">0</ns4:owrite>
          <ns4:oexec datatype="boolean" operation="equals">0</ns4:oexec>
          <ns4:has_extended_acl datatype="boolean" operation="equals">0</ns4:has_extended_acl>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_group_etc_security_opasswd:ste:1" version="1">
          <ns4:group_id datatype="int" operation="equals">0</ns4:group_id>
          <ns4:sgid datatype="boolean" operation="equals">0</ns4:sgid>
          <ns4:gread datatype="boolean" operation="equals">0</ns4:gread>
          <ns4:gwrite datatype="boolean" operation="equals">0</ns4:gwrite>
          <ns4:gexec datatype="boolean" operation="equals">0</ns4:gexec>
        </ns4:file_state>
        <ns5:partition_state id="oval:ssg-state_local_nodev:ste:1" version="1">
          <ns5:device operation="pattern match">^/dev/.*$</ns5:device>
          <ns5:mount_options datatype="string" entity_check="all" operation="not equal">nodev</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_mount_option_var_tmp_bind_compare_source:ste:1" version="1">
          <ns5:device datatype="string" entity_check="at least one" operation="equals" var_ref="oval:ssg-var_mount_option_var_tmp_bind_var_tmp_source_device:var:1"/>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_nfs_nosuid_is_nfs:ste:1" version="1">
          <ns5:fs_type datatype="string" operation="pattern match">^nfs\d?$</ns5:fs_type>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_nfs_nosuid_without_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_nfs_noexec_is_nfs:ste:1" version="1">
          <ns5:fs_type datatype="string" operation="pattern match">^nfs\d?$</ns5:fs_type>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_nfs_noexec_without_noexec:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns5:mount_options>
        </ns5:partition_state>
        <ns4:password_state id="oval:ssg-state_home_nosuid_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns5:partition_state id="oval:ssg-state_home_nosuid_contains_home:ste:1" version="1">
          <ns5:mount_point datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_home_nosuid_home_directories:var:1"/>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_home_nosuid_has_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns4:file_state id="oval:ssg-state_owner_var_log_messages:ste:1" version="1">
          <ns4:group_id datatype="int" operation="equals">0</ns4:group_id>
          <ns4:user_id datatype="int" operation="equals">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_var_log_messages:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:password_state id="oval:ssg-state_user_interactive_home_partition_exists_is_interactive_user:ste:1" version="1">
          <ns4:user_id datatype="int" operation="greater than or equal">1000</ns4:user_id>
        </ns4:password_state>
        <ns4:password_state id="oval:ssg-state_user_interactive_home_partition_exists_is_not_nobody:ste:1" version="1">
          <ns4:user_id datatype="int" operation="not equal">65534</ns4:user_id>
        </ns4:password_state>
        <ns3:variable_state id="oval:ssg-state_user_interactive_home_partition_exists_each_home_parent_has_partition:ste:1" version="1">
          <ns3:value datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_user_interactive_home_partition_exists_file_objects:var:1"/>
        </ns3:variable_state>
        <ns3:textfilecontent54_state id="oval:ssg-obj_dconf_backend_first_line:ste:1" version="2">
          <ns3:text>service-db:keyfile/user</ns3:text>
        </ns3:textfilecontent54_state>
        <ns3:variable_state id="oval:ssg-state_mcafee_definitions_max_age:ste:1" version="1">
          <ns3:value datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-var_mcafee_antivirus_definition_expire:var:1"/>
        </ns3:variable_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_enable_dracut_fips_module:ste:1" version="1">
          <ns3:subexpression datatype="string" operation="equals">fips</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:variable_state comment="variable value is set to 'FIPS'" id="oval:ssg-ste_system_crypto_policy_value:ste:1" version="1">
          <ns3:value datatype="string" operation="equals">FIPS</ns3:value>
        </ns3:variable_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_crypto_fips_enabled:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">1</ns4:value>
        </ns4:sysctl_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_aide_verify_acls:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*acl.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_aide_verify_ext_attributes:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*xattrs.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_aide_check_attributes:ste:1" version="1">
          <ns3:subexpression operation="equals">p+i+n+u+g+s+b+acl+selinux+xattrs+sha512</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="The user root is always allowed as default opering system user" id="oval:ssg-state_default_os_user:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^root$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state comment="authorized usernames required by the installed software groups and applications" id="oval:ssg-state_accounts_authorized_local_users:ste:1" version="1">
          <ns3:subexpression operation="pattern match" var_ref="oval:ssg-var_accounts_authorized_local_users_regex:var:1"/>
        </ns3:textfilecontent54_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_cron_allow_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_etc_group_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_etc_gshadow_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_etc_passwd_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_etc_shadow_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_groupowner_grub_conf_gid_0:ste:1" version="1">
          <ns4:group_id datatype="int">0</ns4:group_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_cron_allow_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_etc_group_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_etc_gshadow_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_etc_passwd_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_etc_shadow_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_owner_grub_conf_uid_0:ste:1" version="1">
          <ns4:user_id datatype="int">0</ns4:user_id>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_cron_allow_mode_0644:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_etc_group_mode_0644:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_etc_gshadow_mode_0000:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">false</ns4:uread>
          <ns4:uwrite datatype="boolean">false</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">false</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_etc_passwd_mode_0644:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_etc_shadow_mode_0000:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">false</ns4:uread>
          <ns4:uwrite datatype="boolean">false</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">false</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_grub_conf_mode_0600:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">false</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_httpd_server_conf_d_files_mode_0640:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_httpd_server_conf_files_mode_0640:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_https_server_modules_files_mode_0640:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_sshd_private_key_mode_0600:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">false</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">false</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns4:file_state id="oval:ssg-state_file_permissions_sshd_pub_key_mode_0644:ste:1" version="1">
          <ns4:suid datatype="boolean">false</ns4:suid>
          <ns4:sgid datatype="boolean">false</ns4:sgid>
          <ns4:sticky datatype="boolean">false</ns4:sticky>
          <ns4:uread datatype="boolean">true</ns4:uread>
          <ns4:uwrite datatype="boolean">true</ns4:uwrite>
          <ns4:uexec datatype="boolean">false</ns4:uexec>
          <ns4:gread datatype="boolean">true</ns4:gread>
          <ns4:gwrite datatype="boolean">false</ns4:gwrite>
          <ns4:gexec datatype="boolean">false</ns4:gexec>
          <ns4:oread datatype="boolean">true</ns4:oread>
          <ns4:owrite datatype="boolean">false</ns4:owrite>
          <ns4:oexec datatype="boolean">false</ns4:oexec>
        </ns4:file_state>
        <ns5:partition_state id="oval:ssg-state_dev_shm_partition_nodev:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_dev_shm_partition_noexec:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_dev_shm_partition_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_home_partition_nodev:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_home_partition_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_tmp_partition_nodev:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_tmp_partition_noexec:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_tmp_partition_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_var_tmp_partition_nodev:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_var_tmp_partition_noexec:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns5:mount_options>
        </ns5:partition_state>
        <ns5:partition_state id="oval:ssg-state_var_tmp_partition_nosuid:ste:1" version="1">
          <ns5:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns5:mount_options>
        </ns5:partition_state>
        <ns5:systemdunitdependency_state comment="SuSEfirewall2 listed at least once in the dependencies" id="oval:ssg-state_systemd_SuSEfirewall2_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">SuSEfirewall2.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="SuSEfirewall2 listed at least once in the dependencies" id="oval:ssg-state_systemd_SuSEfirewall2_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">SuSEfirewall2.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="SuSEfirewall2 is running" id="oval:ssg-state_service_running_SuSEfirewall2:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="abrtd service is not listed in the dependencies" id="oval:ssg-state_systemd_abrtd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">abrtd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="abrtd socket is not listed in the dependencies" id="oval:ssg-state_systemd_abrtd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">abrtd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="abrtd is not running" id="oval:ssg-state_service_not_running_abrtd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="acpid service is not listed in the dependencies" id="oval:ssg-state_systemd_acpid_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">acpid.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="acpid socket is not listed in the dependencies" id="oval:ssg-state_systemd_acpid_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">acpid.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="acpid is not running" id="oval:ssg-state_service_not_running_acpid:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="apparmor listed at least once in the dependencies" id="oval:ssg-state_systemd_apparmor_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">apparmor.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="apparmor listed at least once in the dependencies" id="oval:ssg-state_systemd_apparmor_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">apparmor.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="apparmor is running" id="oval:ssg-state_service_running_apparmor:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="atd service is not listed in the dependencies" id="oval:ssg-state_systemd_atd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">atd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="atd socket is not listed in the dependencies" id="oval:ssg-state_systemd_atd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">atd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="atd is not running" id="oval:ssg-state_service_not_running_atd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="auditd listed at least once in the dependencies" id="oval:ssg-state_systemd_auditd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">auditd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="auditd listed at least once in the dependencies" id="oval:ssg-state_systemd_auditd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">auditd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="auditd is running" id="oval:ssg-state_service_running_auditd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="autofs service is not listed in the dependencies" id="oval:ssg-state_systemd_autofs_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">autofs.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="autofs socket is not listed in the dependencies" id="oval:ssg-state_systemd_autofs_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">autofs.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="autofs is not running" id="oval:ssg-state_service_not_running_autofs:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="avahi-daemon service is not listed in the dependencies" id="oval:ssg-state_systemd_avahi-daemon_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">avahi-daemon.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="avahi-daemon socket is not listed in the dependencies" id="oval:ssg-state_systemd_avahi-daemon_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">avahi-daemon.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="avahi-daemon is not running" id="oval:ssg-state_service_not_running_avahi-daemon:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="bluetooth service is not listed in the dependencies" id="oval:ssg-state_systemd_bluetooth_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">bluetooth.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="bluetooth socket is not listed in the dependencies" id="oval:ssg-state_systemd_bluetooth_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">bluetooth.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="bluetooth is not running" id="oval:ssg-state_service_not_running_bluetooth:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="certmonger service is not listed in the dependencies" id="oval:ssg-state_systemd_certmonger_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">certmonger.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="certmonger socket is not listed in the dependencies" id="oval:ssg-state_systemd_certmonger_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">certmonger.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="certmonger is not running" id="oval:ssg-state_service_not_running_certmonger:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="cgconfig service is not listed in the dependencies" id="oval:ssg-state_systemd_cgconfig_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cgconfig.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="cgconfig socket is not listed in the dependencies" id="oval:ssg-state_systemd_cgconfig_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cgconfig.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="cgconfig is not running" id="oval:ssg-state_service_not_running_cgconfig:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="cgred service is not listed in the dependencies" id="oval:ssg-state_systemd_cgred_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cgred.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="cgred socket is not listed in the dependencies" id="oval:ssg-state_systemd_cgred_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cgred.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="cgred is not running" id="oval:ssg-state_service_not_running_cgred:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="chronyd listed at least once in the dependencies" id="oval:ssg-state_systemd_chronyd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">chronyd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="chronyd listed at least once in the dependencies" id="oval:ssg-state_systemd_chronyd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">chronyd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="chronyd is running" id="oval:ssg-state_service_running_chronyd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="cpupower service is not listed in the dependencies" id="oval:ssg-state_systemd_cpupower_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cpupower.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="cpupower socket is not listed in the dependencies" id="oval:ssg-state_systemd_cpupower_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cpupower.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="cpupower is not running" id="oval:ssg-state_service_not_running_cpupower:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="crond listed at least once in the dependencies" id="oval:ssg-state_systemd_crond_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">crond.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="crond listed at least once in the dependencies" id="oval:ssg-state_systemd_crond_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">crond.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="crond is running" id="oval:ssg-state_service_running_crond:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="cups service is not listed in the dependencies" id="oval:ssg-state_systemd_cups_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cups.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="cups socket is not listed in the dependencies" id="oval:ssg-state_systemd_cups_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">cups.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="cups is not running" id="oval:ssg-state_service_not_running_cups:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="debug-shell service is not listed in the dependencies" id="oval:ssg-state_systemd_debug-shell_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">debug-shell.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="debug-shell socket is not listed in the dependencies" id="oval:ssg-state_systemd_debug-shell_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">debug-shell.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="debug-shell is not running" id="oval:ssg-state_service_not_running_debug-shell:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="dhcpd service is not listed in the dependencies" id="oval:ssg-state_systemd_dhcpd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">dhcpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="dhcpd socket is not listed in the dependencies" id="oval:ssg-state_systemd_dhcpd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">dhcpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="dhcpd is not running" id="oval:ssg-state_service_not_running_dhcpd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="docker listed at least once in the dependencies" id="oval:ssg-state_systemd_docker_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">docker.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="docker listed at least once in the dependencies" id="oval:ssg-state_systemd_docker_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">docker.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="docker is running" id="oval:ssg-state_service_running_docker:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="dovecot service is not listed in the dependencies" id="oval:ssg-state_systemd_dovecot_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">dovecot.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="dovecot socket is not listed in the dependencies" id="oval:ssg-state_systemd_dovecot_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">dovecot.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="dovecot is not running" id="oval:ssg-state_service_not_running_dovecot:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="firewalld listed at least once in the dependencies" id="oval:ssg-state_systemd_firewalld_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">firewalld.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="firewalld listed at least once in the dependencies" id="oval:ssg-state_systemd_firewalld_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">firewalld.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="firewalld is running" id="oval:ssg-state_service_running_firewalld:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="httpd service is not listed in the dependencies" id="oval:ssg-state_systemd_httpd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">httpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="httpd socket is not listed in the dependencies" id="oval:ssg-state_systemd_httpd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">httpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="httpd is not running" id="oval:ssg-state_service_not_running_httpd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="irqbalance listed at least once in the dependencies" id="oval:ssg-state_systemd_irqbalance_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">irqbalance.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="irqbalance listed at least once in the dependencies" id="oval:ssg-state_systemd_irqbalance_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">irqbalance.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="irqbalance is running" id="oval:ssg-state_service_running_irqbalance:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="kdump service is not listed in the dependencies" id="oval:ssg-state_systemd_kdump_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">kdump.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="kdump socket is not listed in the dependencies" id="oval:ssg-state_systemd_kdump_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">kdump.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="kdump is not running" id="oval:ssg-state_service_not_running_kdump:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="mdmonitor service is not listed in the dependencies" id="oval:ssg-state_systemd_mdmonitor_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">mdmonitor.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="mdmonitor socket is not listed in the dependencies" id="oval:ssg-state_systemd_mdmonitor_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">mdmonitor.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="mdmonitor is not running" id="oval:ssg-state_service_not_running_mdmonitor:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="messagebus service is not listed in the dependencies" id="oval:ssg-state_systemd_messagebus_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">messagebus.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="messagebus socket is not listed in the dependencies" id="oval:ssg-state_systemd_messagebus_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">messagebus.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="messagebus is not running" id="oval:ssg-state_service_not_running_messagebus:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="named service is not listed in the dependencies" id="oval:ssg-state_systemd_named_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">named.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="named socket is not listed in the dependencies" id="oval:ssg-state_systemd_named_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">named.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="named is not running" id="oval:ssg-state_service_not_running_named:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="nfs service is not listed in the dependencies" id="oval:ssg-state_systemd_nfs_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">nfs.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="nfs socket is not listed in the dependencies" id="oval:ssg-state_systemd_nfs_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">nfs.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="nfs is not running" id="oval:ssg-state_service_not_running_nfs:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="nfslock service is not listed in the dependencies" id="oval:ssg-state_systemd_nfslock_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">nfslock.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="nfslock socket is not listed in the dependencies" id="oval:ssg-state_systemd_nfslock_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">nfslock.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="nfslock is not running" id="oval:ssg-state_service_not_running_nfslock:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="ntpd service is not listed in the dependencies" id="oval:ssg-state_systemd_ntpd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ntpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="ntpd socket is not listed in the dependencies" id="oval:ssg-state_systemd_ntpd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ntpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="ntpd is not running" id="oval:ssg-state_service_not_running_ntpd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="ntpd listed at least once in the dependencies" id="oval:ssg-state_systemd_ntpd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">ntpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="ntpd listed at least once in the dependencies" id="oval:ssg-state_systemd_ntpd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">ntpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="ntpd is running" id="oval:ssg-state_service_running_ntpd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="ntpdate service is not listed in the dependencies" id="oval:ssg-state_systemd_ntpdate_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ntpdate.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="ntpdate socket is not listed in the dependencies" id="oval:ssg-state_systemd_ntpdate_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ntpdate.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="ntpdate is not running" id="oval:ssg-state_service_not_running_ntpdate:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="oddjobd service is not listed in the dependencies" id="oval:ssg-state_systemd_oddjobd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">oddjobd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="oddjobd socket is not listed in the dependencies" id="oval:ssg-state_systemd_oddjobd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">oddjobd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="oddjobd is not running" id="oval:ssg-state_service_not_running_oddjobd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="pcscd listed at least once in the dependencies" id="oval:ssg-state_systemd_pcscd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">pcscd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="pcscd listed at least once in the dependencies" id="oval:ssg-state_systemd_pcscd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">pcscd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="pcscd is running" id="oval:ssg-state_service_running_pcscd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="portreserve service is not listed in the dependencies" id="oval:ssg-state_systemd_portreserve_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">portreserve.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="portreserve socket is not listed in the dependencies" id="oval:ssg-state_systemd_portreserve_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">portreserve.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="portreserve is not running" id="oval:ssg-state_service_not_running_portreserve:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="postfix listed at least once in the dependencies" id="oval:ssg-state_systemd_postfix_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">postfix.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="postfix listed at least once in the dependencies" id="oval:ssg-state_systemd_postfix_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">postfix.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="postfix is running" id="oval:ssg-state_service_running_postfix:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="psacct listed at least once in the dependencies" id="oval:ssg-state_systemd_psacct_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">psacct.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="psacct listed at least once in the dependencies" id="oval:ssg-state_systemd_psacct_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">psacct.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="psacct is running" id="oval:ssg-state_service_running_psacct:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="qpidd service is not listed in the dependencies" id="oval:ssg-state_systemd_qpidd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">qpidd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="qpidd socket is not listed in the dependencies" id="oval:ssg-state_systemd_qpidd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">qpidd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="qpidd is not running" id="oval:ssg-state_service_not_running_qpidd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="quota_nld service is not listed in the dependencies" id="oval:ssg-state_systemd_quota_nld_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">quota_nld.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="quota_nld socket is not listed in the dependencies" id="oval:ssg-state_systemd_quota_nld_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">quota_nld.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="quota_nld is not running" id="oval:ssg-state_service_not_running_quota_nld:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rdisc service is not listed in the dependencies" id="oval:ssg-state_systemd_rdisc_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rdisc.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rdisc socket is not listed in the dependencies" id="oval:ssg-state_systemd_rdisc_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rdisc.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rdisc is not running" id="oval:ssg-state_service_not_running_rdisc:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rexec service is not listed in the dependencies" id="oval:ssg-state_systemd_rexec_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rexec.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rexec socket is not listed in the dependencies" id="oval:ssg-state_systemd_rexec_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rexec.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rexec is not running" id="oval:ssg-state_service_not_running_rexec:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rhnsd service is not listed in the dependencies" id="oval:ssg-state_systemd_rhnsd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rhnsd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rhnsd socket is not listed in the dependencies" id="oval:ssg-state_systemd_rhnsd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rhnsd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rhnsd is not running" id="oval:ssg-state_service_not_running_rhnsd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rhsmcertd service is not listed in the dependencies" id="oval:ssg-state_systemd_rhsmcertd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rhsmcertd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rhsmcertd socket is not listed in the dependencies" id="oval:ssg-state_systemd_rhsmcertd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rhsmcertd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rhsmcertd is not running" id="oval:ssg-state_service_not_running_rhsmcertd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rlogin service is not listed in the dependencies" id="oval:ssg-state_systemd_rlogin_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rlogin.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rlogin socket is not listed in the dependencies" id="oval:ssg-state_systemd_rlogin_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rlogin.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rlogin is not running" id="oval:ssg-state_service_not_running_rlogin:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rpcbind service is not listed in the dependencies" id="oval:ssg-state_systemd_rpcbind_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcbind.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rpcbind socket is not listed in the dependencies" id="oval:ssg-state_systemd_rpcbind_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcbind.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rpcbind is not running" id="oval:ssg-state_service_not_running_rpcbind:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rpcgssd service is not listed in the dependencies" id="oval:ssg-state_systemd_rpcgssd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcgssd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rpcgssd socket is not listed in the dependencies" id="oval:ssg-state_systemd_rpcgssd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcgssd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rpcgssd is not running" id="oval:ssg-state_service_not_running_rpcgssd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rpcidmapd service is not listed in the dependencies" id="oval:ssg-state_systemd_rpcidmapd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcidmapd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rpcidmapd socket is not listed in the dependencies" id="oval:ssg-state_systemd_rpcidmapd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcidmapd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rpcidmapd is not running" id="oval:ssg-state_service_not_running_rpcidmapd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rpcsvcgssd service is not listed in the dependencies" id="oval:ssg-state_systemd_rpcsvcgssd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcsvcgssd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rpcsvcgssd socket is not listed in the dependencies" id="oval:ssg-state_systemd_rpcsvcgssd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rpcsvcgssd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rpcsvcgssd is not running" id="oval:ssg-state_service_not_running_rpcsvcgssd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rsh service is not listed in the dependencies" id="oval:ssg-state_systemd_rsh_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rsh.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rsh socket is not listed in the dependencies" id="oval:ssg-state_systemd_rsh_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">rsh.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rsh is not running" id="oval:ssg-state_service_not_running_rsh:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="rsyslog listed at least once in the dependencies" id="oval:ssg-state_systemd_rsyslog_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">rsyslog.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="rsyslog listed at least once in the dependencies" id="oval:ssg-state_systemd_rsyslog_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">rsyslog.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="rsyslog is running" id="oval:ssg-state_service_running_rsyslog:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="saslauthd service is not listed in the dependencies" id="oval:ssg-state_systemd_saslauthd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">saslauthd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="saslauthd socket is not listed in the dependencies" id="oval:ssg-state_systemd_saslauthd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">saslauthd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="saslauthd is not running" id="oval:ssg-state_service_not_running_saslauthd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="smartd service is not listed in the dependencies" id="oval:ssg-state_systemd_smartd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">smartd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="smartd socket is not listed in the dependencies" id="oval:ssg-state_systemd_smartd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">smartd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="smartd is not running" id="oval:ssg-state_service_not_running_smartd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="smb service is not listed in the dependencies" id="oval:ssg-state_systemd_smb_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">smb.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="smb socket is not listed in the dependencies" id="oval:ssg-state_systemd_smb_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">smb.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="smb is not running" id="oval:ssg-state_service_not_running_smb:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="snmpd service is not listed in the dependencies" id="oval:ssg-state_systemd_snmpd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">snmpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="snmpd socket is not listed in the dependencies" id="oval:ssg-state_systemd_snmpd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">snmpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="snmpd is not running" id="oval:ssg-state_service_not_running_snmpd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="squid service is not listed in the dependencies" id="oval:ssg-state_systemd_squid_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">squid.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="squid socket is not listed in the dependencies" id="oval:ssg-state_systemd_squid_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">squid.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="squid is not running" id="oval:ssg-state_service_not_running_squid:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="sshd service is not listed in the dependencies" id="oval:ssg-state_systemd_sshd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sshd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="sshd socket is not listed in the dependencies" id="oval:ssg-state_systemd_sshd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sshd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="sshd is not running" id="oval:ssg-state_service_not_running_sshd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="sshd listed at least once in the dependencies" id="oval:ssg-state_systemd_sshd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">sshd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="sshd listed at least once in the dependencies" id="oval:ssg-state_systemd_sshd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">sshd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="sshd is running" id="oval:ssg-state_service_running_sshd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="sssd service is not listed in the dependencies" id="oval:ssg-state_systemd_sssd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sssd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="sssd socket is not listed in the dependencies" id="oval:ssg-state_systemd_sssd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sssd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="sssd is not running" id="oval:ssg-state_service_not_running_sssd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="sssd listed at least once in the dependencies" id="oval:ssg-state_systemd_sssd_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">sssd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="sssd listed at least once in the dependencies" id="oval:ssg-state_systemd_sssd_socket_on:ste:1" version="1">
          <ns5:dependency entity_check="at least one">sssd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="sssd is running" id="oval:ssg-state_service_running_sssd:ste:1" version="1">
          <ns5:value>active</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="sysstat service is not listed in the dependencies" id="oval:ssg-state_systemd_sysstat_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sysstat.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="sysstat socket is not listed in the dependencies" id="oval:ssg-state_systemd_sysstat_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">sysstat.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="sysstat is not running" id="oval:ssg-state_service_not_running_sysstat:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="telnet service is not listed in the dependencies" id="oval:ssg-state_systemd_telnet_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">telnet.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="telnet socket is not listed in the dependencies" id="oval:ssg-state_systemd_telnet_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">telnet.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="telnet is not running" id="oval:ssg-state_service_not_running_telnet:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="tftp service is not listed in the dependencies" id="oval:ssg-state_systemd_tftp_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">tftp.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="tftp socket is not listed in the dependencies" id="oval:ssg-state_systemd_tftp_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">tftp.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="tftp is not running" id="oval:ssg-state_service_not_running_tftp:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="vsftpd service is not listed in the dependencies" id="oval:ssg-state_systemd_vsftpd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">vsftpd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="vsftpd socket is not listed in the dependencies" id="oval:ssg-state_systemd_vsftpd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">vsftpd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="vsftpd is not running" id="oval:ssg-state_service_not_running_vsftpd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="xinetd service is not listed in the dependencies" id="oval:ssg-state_systemd_xinetd_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">xinetd.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="xinetd socket is not listed in the dependencies" id="oval:ssg-state_systemd_xinetd_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">xinetd.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="xinetd is not running" id="oval:ssg-state_service_not_running_xinetd:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="ypbind service is not listed in the dependencies" id="oval:ssg-state_systemd_ypbind_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ypbind.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="ypbind socket is not listed in the dependencies" id="oval:ssg-state_systemd_ypbind_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">ypbind.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="ypbind is not running" id="oval:ssg-state_service_not_running_ypbind:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns5:systemdunitdependency_state comment="zebra service is not listed in the dependencies" id="oval:ssg-state_systemd_zebra_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">zebra.service</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitdependency_state comment="zebra socket is not listed in the dependencies" id="oval:ssg-state_systemd_zebra_socket_off:ste:1" version="1">
          <ns5:dependency entity_check="none satisfy">zebra.socket</ns5:dependency>
        </ns5:systemdunitdependency_state>
        <ns5:systemdunitproperty_state comment="zebra is not running" id="oval:ssg-state_service_not_running_zebra:ste:1" version="1">
          <ns5:value>inactive</ns5:value>
        </ns5:systemdunitproperty_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_fs_suid_dumpable:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">0</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_kernel_kptr_restrict:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">1</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_kernel_randomize_va_space:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">2</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_log_martians:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_rp_filter:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_all_send_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">0</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_log_martians:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_log_martians_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_rp_filter:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_conf_default_send_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">0</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_ip_forward:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">0</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv4_tcp_syncookies:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_ra:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_disable_ipv6:ste:1" version="1">
          <ns4:value datatype="int" operation="equals">1</ns4:value>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_all_forwarding:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_ra:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1"/>
        </ns4:sysctl_state>
        <ns4:sysctl_state id="oval:ssg-state_sysctl_runtime_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
          <ns4:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1"/>
        </ns4:sysctl_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_log_martians:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_log_martians_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
          <ns3:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1"/>
        </ns3:textfilecontent54_state>
        <ns5:rpminfo_state id="oval:ssg-state_centos6:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_centos7:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_centos8:ste:1" version="1">
          <ns5:version operation="pattern match">^8.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_ol6_system:ste:1" version="1">
          <ns5:version operation="pattern match">^6Server$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_ol7_system:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_ol8_system:ste:1" version="1">
          <ns5:version operation="pattern match">^8.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_opensuse_installed:ste:1" version="1">
          <ns5:name operation="pattern match">openSUSE-release</ns5:name>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_opensuse_leap15_installed:ste:1" version="1">
          <ns5:version operation="pattern match">^15.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_opensuse_leap42_installed:ste:1" version="1">
          <ns5:version operation="pattern match">^42.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:family_state id="oval:ssg-state_unix_family:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel_client:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel_workstation:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel_server:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel_computenode:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:family_state id="oval:ssg-state_rhel7_unix_family:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel7_client:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel7_workstation:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel7_server:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel7_computenode:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_rhevh_rhel_version:ste:1" version="1">
          <ns3:subexpression operation="pattern match">7</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:family_state id="oval:ssg-state_rhel8_unix_family:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhel8:ste:1" version="1">
          <ns5:version operation="pattern match">^8.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhvh4_version:ste:1" version="1">
          <ns5:version operation="pattern match">^4.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_rhelh4_version:ste:1" version="1">
          <ns3:subexpression operation="pattern match">7</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns5:rpminfo_state id="oval:ssg-state_sl6:ste:1" version="1">
          <ns5:version operation="pattern match">^6.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_sl7:ste:1" version="1">
          <ns5:version operation="pattern match">^7.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_sl8:ste:1" version="1">
          <ns5:version operation="pattern match">^8.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:family_state id="oval:ssg-state_sle11_unix_family:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_sle11_desktop:ste:1" version="1">
          <ns5:version operation="pattern match">^11.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_sle11_server:ste:1" version="1">
          <ns5:version operation="pattern match">^11.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:family_state id="oval:ssg-state_sle12_unix_family:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_sle12_desktop:ste:1" version="1">
          <ns5:version operation="pattern match">^12.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_sle12_server:ste:1" version="1">
          <ns5:version operation="pattern match">^12.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_sle12_sap:ste:1" version="1">
          <ns5:version operation="pattern match">^12.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:family_state id="oval:ssg-state_unix_wrlinux:ste:1" version="1">
          <ns3:family>unix</ns3:family>
        </ns3:family_state>
        <ns5:rpminfo_state id="oval:ssg-state_ocp3_atomic:ste:1" version="1">
          <ns5:version operation="pattern match">^3.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_ocp3_node:ste:1" version="1">
          <ns5:version operation="pattern match">^3.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_ocp3_hyperkube:ste:1" version="1">
          <ns5:version operation="pattern match">^3.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhosp13_release:ste:1" version="1">
          <ns5:version operation="pattern match">^13.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns5:rpminfo_state id="oval:ssg-state_rhevm4_version:ste:1" version="1">
          <ns5:version operation="pattern match">^4.*$</ns5:version>
        </ns5:rpminfo_state>
        <ns3:variable_state id="oval:ssg-state_sshd_not_required:ste:1" version="1">
          <ns3:value datatype="int" operation="equals">1</ns3:value>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_sshd_required:ste:1" version="1">
          <ns3:value datatype="int" operation="equals">2</ns3:value>
        </ns3:variable_state>
        <ns3:variable_state id="oval:ssg-state_sshd_requirement_unset:ste:1" version="1">
          <ns3:value datatype="int" operation="equals">0</ns3:value>
        </ns3:variable_state>
        <ns5:rpminfo_state id="oval:ssg-state_rpm_openssh-server-version:ste:1" version="1">
          <ns5:evr datatype="evr_string" operation="greater than or equal">0:7.4</ns5:evr>
        </ns5:rpminfo_state>
        <ns5:dpkginfo_state id="oval:ssg-state_deb_openssh-server-version:ste:1" version="1">
          <ns5:evr datatype="evr_string" operation="greater than or equal">0:7.4</ns5:evr>
        </ns5:dpkginfo_state>
        <ns4:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_aarch_64:ste:1" version="1">
          <ns4:processor_type operation="equals">aarch64</ns4:processor_type>
        </ns4:uname_state>
        <ns4:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppc_64:ste:1" version="1">
          <ns4:processor_type operation="equals">ppc64</ns4:processor_type>
        </ns4:uname_state>
        <ns4:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppcle_64:ste:1" version="1">
          <ns4:processor_type operation="equals">ppc64le</ns4:processor_type>
        </ns4:uname_state>
        <ns4:uname_state comment="32 bit architecture" id="oval:ssg-state_system_info_architecture_x86:ste:1" version="1">
          <ns4:processor_type operation="equals">i686</ns4:processor_type>
        </ns4:uname_state>
        <ns4:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_x86_64:ste:1" version="1">
          <ns4:processor_type operation="equals">x86_64</ns4:processor_type>
        </ns4:uname_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nodev:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*nodev.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_remote_filesystem_noexec:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*noexec.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
        <ns3:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nosuid:ste:1" version="1">
          <ns3:subexpression operation="pattern match">^.*nosuid.*$</ns3:subexpression>
        </ns3:textfilecontent54_state>
      </oval:states>
      <oval:variables>
        <oval:external_variable comment="expected email alias" datatype="string" id="oval:ssg-var_postfix_root_mail_alias:var:1" version="1"/>
        <oval:external_variable comment="maxpoll value" datatype="int" id="oval:ssg-var_time_service_set_maxpoll:var:1" version="1"/>
        <oval:external_variable comment="timeout value" datatype="int" id="oval:ssg-sshd_idle_timeout_value:var:1" version="1"/>
        <oval:external_variable comment="ClientAliveCountMax value" datatype="int" id="oval:ssg-var_sshd_set_keepalive:var:1" version="1"/>
        <oval:external_variable comment="maxauthtries value" datatype="int" id="oval:ssg-sshd_max_auth_tries_value:var:1" version="1"/>
        <oval:local_variable comment="MACs values splitted on comma" datatype="string" id="oval:ssg-var_sshd_config_macs:var:1" version="1">
          <oval:split delimiter=",">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-obj_sshd_config_macs:obj:1"/>
          </oval:split>
        </oval:local_variable>
        <oval:local_variable comment="approved MACs values splitted on comma" datatype="string" id="oval:ssg-var_sshd_approved_macs:var:1" version="1">
          <oval:split delimiter=",">
            <oval:variable_component var_ref="oval:ssg-sshd_approved_macs:var:1"/>
          </oval:split>
        </oval:local_variable>
        <oval:external_variable comment="SSH Approved MACs by FIPS" datatype="string" id="oval:ssg-sshd_approved_macs:var:1" version="1"/>
        <oval:external_variable comment="external variable for the desired value of UsePrivilegeSeparation" datatype="string" id="oval:ssg-var_sshd_priv_separation:var:1" version="1"/>
        <oval:external_variable comment="memcache_timeout value" datatype="int" id="oval:ssg-var_sssd_memcache_timeout:var:1" version="1"/>
        <oval:external_variable comment="warning banner text variable" datatype="string" id="oval:ssg-login_banner_text:var:1" version="1"/>
        <oval:local_variable comment="expected delay in microseconds" datatype="int" id="oval:ssg-var_faildelay_us:var:1" version="1">
          <oval:arithmetic arithmetic_operation="multiply">
            <oval:variable_component var_ref="oval:ssg-var_accounts_fail_delay:var:1"/>
            <oval:literal_component datatype="int">1000000</oval:literal_component>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:external_variable comment="login failure delay in seconds" datatype="int" id="oval:ssg-var_accounts_fail_delay:var:1" version="1"/>
        <oval:external_variable comment="number of passwords that should be remembered" datatype="int" id="oval:ssg-var_password_pam_unix_remember:var:1" version="1"/>
        <oval:local_variable comment="Regex containing skipped lines" datatype="string" id="oval:ssg-var_accounts_passwords_pam_faillock_preauth_default_lines_regex_system-auth:var:1" version="1">
          <oval:concat>
            <oval:literal_component datatype="string">pam_unix(?:.*[\n](?:.*[\n]){</oval:literal_component>
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_accounts_passwords_pam_faillock_lines_value_system-auth:obj:1"/>
            <oval:literal_component datatype="string">})(?:.*[\n])*auth.*pam_faillock.so[\s]+[^\n]*deny=([0-9]+)</oval:literal_component>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Regex containing skipped lines" datatype="string" id="oval:ssg-var_accounts_passwords_pam_faillock_preauth_default_lines_regex_password-auth:var:1" version="1">
          <oval:concat>
            <oval:literal_component datatype="string">pam_unix(?:.*[\n](?:.*[\n]){</oval:literal_component>
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_accounts_passwords_pam_faillock_lines_value_password-auth:obj:1"/>
            <oval:literal_component datatype="string">})(?:.*[\n])*auth.*pam_faillock.so[\s]+[^\n]*deny=([0-9]+)</oval:literal_component>
          </oval:concat>
        </oval:local_variable>
        <oval:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" version="1"/>
        <oval:external_variable comment="minimum password length" datatype="int" id="oval:ssg-var_password_pam_difok:var:1" version="1"/>
        <oval:external_variable comment="minimum password length" datatype="int" id="oval:ssg-var_password_pam_minlen:var:1" version="1"/>
        <oval:local_variable comment="The value of last ENCRYPT_METHOD directive in /etc/login.defs" datatype="string" id="oval:ssg-variable_last_encrypt_method_instance_value:var:1" version="1">
          <oval:regex_capture pattern="ENCRYPT_METHOD\s+(\w+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="The value of last SHA_CRYPT_MIN_ROUNDS directive in /etc/login.defs" datatype="string" id="oval:ssg-variable_last_sha_crypt_min_rounds_instance_value:var:1" version="1">
          <oval:regex_capture pattern="SHA_CRYPT_MIN_ROUNDS\s+(\w+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sha_crypt_min_rounds_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="The value of last SHA_CRYPT_MAX_ROUNDS directive in /etc/login.defs" datatype="string" id="oval:ssg-variable_last_sha_crypt_max_rounds_instance_value:var:1" version="1">
          <oval:regex_capture pattern="SHA_CRYPT_MAX_ROUNDS\s+(\w+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sha_crypt_max_rounds_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="Count of all uids (including duplicates if any)" datatype="int" id="oval:ssg-variable_count_of_all_uids:var:1" version="1">
          <oval:count>
            <oval:object_component item_field="user_id" object_ref="oval:ssg-obj_all_uids:obj:1"/>
          </oval:count>
        </oval:local_variable>
        <oval:local_variable comment="Count of unique uids" datatype="int" id="oval:ssg-variable_count_of_unique_uids:var:1" version="1">
          <oval:count>
            <oval:unique>
              <oval:object_component item_field="user_id" object_ref="oval:ssg-obj_all_uids:obj:1"/>
            </oval:unique>
          </oval:count>
        </oval:local_variable>
        <oval:external_variable comment="inactive days expiration" datatype="int" id="oval:ssg-var_account_disable_post_pw_expiration:var:1" version="1"/>
        <oval:local_variable comment="Count of all username rows retrieved from /etc/passwd (including duplicates if any)" datatype="int" id="oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1" version="1">
          <oval:count>
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1"/>
          </oval:count>
        </oval:local_variable>
        <oval:local_variable comment="Count of unique username rows retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1" version="1">
          <oval:count>
            <oval:unique>
              <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1"/>
            </oval:unique>
          </oval:count>
        </oval:local_variable>
        <oval:external_variable comment="account maximum age" datatype="int" id="oval:ssg-var_accounts_maximum_age_login_defs:var:1" version="1"/>
        <oval:local_variable comment="The value of last PASS_MAX_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_max_days_instance_value:var:1" version="1">
          <oval:regex_capture pattern="PASS_MAX_DAYS\s+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="The value of last PASS_MIN_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_days_instance_value:var:1" version="1">
          <oval:regex_capture pattern="PASS_MIN_DAYS\s+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:external_variable comment="Minimum password age in days" datatype="int" id="oval:ssg-var_accounts_minimum_age_login_defs:var:1" version="1"/>
        <oval:local_variable comment="The value of last PASS_MIN_LEN directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_len_instance_value:var:1" version="1">
          <oval:regex_capture pattern="PASS_MIN_LEN\s+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:external_variable comment="Password minimum length" datatype="int" id="oval:ssg-var_accounts_password_minlen_login_defs:var:1" version="1"/>
        <oval:local_variable comment="The value of last PASS_WARN_AGE directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_warn_age_instance_value:var:1" version="1">
          <oval:regex_capture pattern="PASS_WARN_AGE\s+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:external_variable comment="password expiration warning age in days" datatype="int" id="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" version="1"/>
        <oval:local_variable comment="UIDs retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_sys_uids_etc_passwd:var:1" version="1">
          <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_entries:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="Value of last UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_uid_min_value:var:1" version="1">
          <oval:regex_capture pattern="UID_MIN[\s]+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="Construct (x - 0) * (x - (UID_MIN - 1)) expression" datatype="int" id="oval:ssg-variable_default_range_quad_expr:var:1" version="1">
          <oval:arithmetic arithmetic_operation="multiply">
            <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
            <oval:arithmetic arithmetic_operation="add">
              <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
              <oval:arithmetic arithmetic_operation="multiply">
                <oval:literal_component datatype="int">-1</oval:literal_component>
                <oval:arithmetic arithmetic_operation="add">
                  <oval:variable_component var_ref="oval:ssg-variable_uid_min_value:var:1"/>
                  <oval:literal_component datatype="int">-1</oval:literal_component>
                </oval:arithmetic>
              </oval:arithmetic>
            </oval:arithmetic>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:local_variable comment="Value of last SYS_UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_min_value:var:1" version="1">
          <oval:regex_capture pattern="SYS_UID_MIN[\s]+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="Value of last SYS_UID_MAX from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_max_value:var:1" version="1">
          <oval:regex_capture pattern="SYS_UID_MAX[\s]+(\d+)">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="Construct (x - 0) * (x - SYS_UID_MIN) expression" datatype="int" id="oval:ssg-variable_reserved_range_quad_expr:var:1" version="1">
          <oval:arithmetic arithmetic_operation="multiply">
            <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
            <oval:arithmetic arithmetic_operation="add">
              <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
              <oval:arithmetic arithmetic_operation="multiply">
                <oval:literal_component datatype="int">-1</oval:literal_component>
                <oval:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1"/>
              </oval:arithmetic>
            </oval:arithmetic>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:local_variable comment="Construct (x - SYS_UID_MIN) * (x - SYS_UID_MAX) expression" datatype="int" id="oval:ssg-variable_dynalloc_range_quad_expr:var:1" version="1">
          <oval:arithmetic arithmetic_operation="multiply">
            <oval:arithmetic arithmetic_operation="add">
              <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
              <oval:arithmetic arithmetic_operation="multiply">
                <oval:literal_component datatype="int">-1</oval:literal_component>
                <oval:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1"/>
              </oval:arithmetic>
            </oval:arithmetic>
            <oval:arithmetic arithmetic_operation="add">
              <oval:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1"/>
              <oval:arithmetic arithmetic_operation="multiply">
                <oval:literal_component datatype="int">-1</oval:literal_component>
                <oval:variable_component var_ref="oval:ssg-variable_sys_uid_max_value:var:1"/>
              </oval:arithmetic>
            </oval:arithmetic>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:external_variable comment="maximum number of concurrent logins per user" datatype="int" id="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" version="1"/>
        <oval:external_variable comment="external variable for TMOUT" datatype="int" id="oval:ssg-var_accounts_tmout:var:1" version="1"/>
        <oval:local_variable comment="List of home directories of interactive users." datatype="string" id="oval:ssg-var_user_interactive_home_exists_home_directory_list:var:1" version="1">
          <oval:object_component item_field="home_dir" object_ref="oval:ssg-obj_user_interactive_home_exists_passwd_list:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of home directories of interactive users." datatype="string" id="oval:ssg-var_user_interactive_home_exists_file_objects:var:1" version="1">
          <oval:object_component item_field="path" object_ref="oval:ssg-obj_user_interactive_home_exists_home_directories:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of home directories of interactive users." datatype="string" id="oval:ssg-var_file_permissions_user_init_files_home_dir_list:var:1" version="1">
          <oval:object_component item_field="home_dir" object_ref="oval:ssg-obj_file_permissions_user_init_files_passwd_list:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of home directories of interactive users." datatype="string" id="oval:ssg-var_file_permissions_home_directories_home_dir_list:var:1" version="1">
          <oval:object_component item_field="home_dir" object_ref="oval:ssg-obj_file_permissions_home_directories_passwd_list:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="Split the PATH on the : delimiter" datatype="string" id="oval:ssg-var_accounts_root_path_dirs_no_write:var:1" version="1">
          <oval:split delimiter=":">
            <oval:object_component item_field="value" object_ref="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1"/>
          </oval:split>
        </oval:local_variable>
        <oval:local_variable comment="First octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1" version="1">
          <oval:substring substring_length="1" substring_start="1">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="Second octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1" version="1">
          <oval:substring substring_length="1" substring_start="2">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="Third octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1" version="1">
          <oval:substring substring_length="1" substring_start="3">
            <oval:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="/etc/login.defs umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_login_defs_umask_as_number:var:1" version="1">
          <oval:arithmetic arithmetic_operation="add">
            <oval:arithmetic arithmetic_operation="multiply">
              <oval:literal_component datatype="int">64</oval:literal_component>
              <oval:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1"/>
            </oval:arithmetic>
            <oval:arithmetic arithmetic_operation="multiply">
              <oval:literal_component datatype="int">8</oval:literal_component>
              <oval:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1"/>
            </oval:arithmetic>
            <oval:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1"/>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:local_variable comment="the paths for all audit rules in audit.rules for privilege_function" datatype="string" id="oval:ssg-var_audit_rules_privilege_function_audit_rules:var:1" version="1">
          <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_audit_rules_privilege_function_audit_rules:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="the paths for all audit rules in rules.d for privilege_function" datatype="string" id="oval:ssg-var_audit_rules_privilege_function_rules_d:var:1" version="1">
          <oval:object_component item_field="subexpression" object_ref="oval:ssg-object_audit_rules_privilege_function_rules_d:obj:1"/>
        </oval:local_variable>
        <oval:external_variable comment="audispd remote_server setting" datatype="string" id="oval:ssg-var_audispd_remote_server:var:1" version="1"/>
        <oval:external_variable comment="audit disk_error_action setting" datatype="string" id="oval:ssg-var_auditd_disk_error_action:var:1" version="1"/>
        <oval:external_variable comment="audit disk_full_action setting" datatype="string" id="oval:ssg-var_auditd_disk_full_action:var:1" version="1"/>
        <oval:external_variable comment="audit action_mail_acct setting" datatype="string" id="oval:ssg-var_auditd_action_mail_acct:var:1" version="1"/>
        <oval:external_variable comment="audit admin_space_left_action setting" datatype="string" id="oval:ssg-var_auditd_admin_space_left_action:var:1" version="1"/>
        <oval:external_variable comment="audit max_log_file setting" datatype="int" id="oval:ssg-var_auditd_max_log_file:var:1" version="1"/>
        <oval:external_variable comment="audit max_log_file_action setting" datatype="string" id="oval:ssg-var_auditd_max_log_file_action:var:1" version="1"/>
        <oval:external_variable comment="audit num_logs setting" datatype="int" id="oval:ssg-var_auditd_num_logs:var:1" version="1"/>
        <oval:external_variable comment="audit space_left setting" datatype="int" id="oval:ssg-var_auditd_space_left:var:1" version="1"/>
        <oval:external_variable comment="audit space_left_action setting" datatype="string" id="oval:ssg-var_auditd_space_left_action:var:1" version="2"/>
        <oval:external_variable comment="used for remediation only" datatype="string" id="oval:ssg-rsyslog_remote_loghost_address:var:1" version="1"/>
        <oval:local_variable comment="all GIDs on the target system" datatype="int" id="oval:ssg-variable_file_permissions_ungroupowned:var:1" version="1">
          <oval:object_component item_field="subexpression" object_ref="oval:ssg-etc_group_object:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of valid user ids" datatype="int" id="oval:ssg-file_permissions_unowned_userid_list:var:1" version="1">
          <oval:object_component item_field="user_id" object_ref="oval:ssg-file_permissions_unowned_userid_list_object:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="Source device of /var/tmp" datatype="string" id="oval:ssg-var_mount_option_var_tmp_bind_var_tmp_source_device:var:1" version="1">
          <oval:object_component item_field="device" object_ref="oval:ssg-object_mount_option_var_tmp:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of home directories of interactive users." datatype="string" id="oval:ssg-var_home_nosuid_interactive_home_dirs:var:1" version="1">
          <oval:object_component item_field="home_dir" object_ref="oval:ssg-obj_home_nosuid_interactive_users:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="File objects for every parent directory on the same mount point as any home directory" datatype="string" id="oval:ssg-var_home_nosuid_home_directories:var:1" version="1">
          <oval:object_component item_field="path" object_ref="oval:ssg-obj_home_nosuid_home_directories:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="List of parent directories of home directories of interactive users." datatype="string" id="oval:ssg-var_user_interactive_home_parent_dirs:var:1" version="1">
          <oval:regex_capture pattern="^(?:(/.+?)/[^/]+/?$|(/))">
            <oval:object_component item_field="home_dir" object_ref="oval:ssg-obj_user_interactive_home_partition_exists_passwd_list:obj:1"/>
          </oval:regex_capture>
        </oval:local_variable>
        <oval:local_variable comment="List of mount points for parent directories of home directories of interactive users." datatype="string" id="oval:ssg-var_user_interactive_home_partition_exists_file_objects:var:1" version="1">
          <oval:object_component item_field="mount_point" object_ref="oval:ssg-obj_user_interactive_home_partition_exists_mount_points:obj:1"/>
        </oval:local_variable>
        <oval:local_variable comment="Age of file for each McAfee definition file." datatype="int" id="oval:ssg-variable_mcafee_dat_files_mtime:var:1" version="1">
          <oval:time_difference format_2="seconds_since_epoch">
            <oval:object_component item_field="m_time" object_ref="oval:ssg-mcafee_dat_files_mtime:obj:1"/>
          </oval:time_difference>
        </oval:local_variable>
        <oval:external_variable comment="defintions age" datatype="int" id="oval:ssg-var_mcafee_antivirus_definition_expire:var:1" version="1"/>
        <oval:external_variable comment="defined crypto policy" datatype="string" id="oval:ssg-var_system_crypto_policy:var:1" version="1"/>
        <oval:external_variable comment="accounts authorized local users on operating system" datatype="string" id="oval:ssg-var_accounts_authorized_local_users_regex:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.all.log_martians" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.all.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.all.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.default.log_martians" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_log_martians_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.default.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.conf.default.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.icmp_echo_ignore_broadcasts" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.icmp_ignore_bogus_error_responses" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv4.tcp_syncookies" datatype="int" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.all.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.all.forwarding" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.default.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" version="1"/>
        <oval:external_variable comment="External variable for net.ipv6.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" version="1"/>
        <oval:external_variable comment="May be defined by Profiles to explicitly say if sshd is required or not" datatype="int" id="oval:ssg-sshd_required:var:1" version="1"/>
        <oval:external_variable comment="Value of var_accounts_user_umask (the required umask) as string" datatype="string" id="oval:ssg-var_accounts_user_umask:var:1" version="1"/>
        <oval:local_variable comment="First octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
          <oval:substring substring_length="1" substring_start="1">
            <oval:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="Second octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
          <oval:substring substring_length="1" substring_start="2">
            <oval:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="Third octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
          <oval:substring substring_length="1" substring_start="3">
            <oval:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1"/>
          </oval:substring>
        </oval:local_variable>
        <oval:local_variable comment="var_accounts_user_umask umask converted from string to a number" datatype="int" id="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" version="1">
          <oval:arithmetic arithmetic_operation="add">
            <oval:arithmetic arithmetic_operation="multiply">
              <oval:literal_component datatype="int">64</oval:literal_component>
              <oval:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_var_accounts_user_umask:var:1"/>
            </oval:arithmetic>
            <oval:arithmetic arithmetic_operation="multiply">
              <oval:literal_component datatype="int">8</oval:literal_component>
              <oval:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_var_accounts_user_umask:var:1"/>
            </oval:arithmetic>
            <oval:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_var_accounts_user_umask:var:1"/>
          </oval:arithmetic>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_chmod_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(chmod)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_chmod_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(chmod)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_chmod_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit chmod EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_chmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_chmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit chmod EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_chmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_chmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit chmod EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_chmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_chmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit chmod EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_chmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_chmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_chown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(chown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_chown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(chown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_chown_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit chown EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_chown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_chown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit chown EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_chown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_chown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit chown EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_chown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_chown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit chown EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_chown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_chown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_chown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_creat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(creat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_creat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(creat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_creat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit creat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_creat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_creat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_creat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit creat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_creat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_creat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_creat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit creat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_creat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_creat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_creat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit creat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_creat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_creat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_creat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fchmod_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchmod)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fchmod_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchmod)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fchmod_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fchmod EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fchmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fchmod EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fchmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchmod EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fchmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchmod EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fchmod_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchmod_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmod_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fchmodat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchmodat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fchmodat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchmodat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fchmodat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fchmodat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fchmodat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchmodat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmodat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fchmodat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fchmodat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchmodat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmodat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchmodat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fchmodat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchmodat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmodat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchmodat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fchmodat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchmodat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchmodat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fchown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fchown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fchown_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fchown EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fchown EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchown EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchown EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fchownat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchownat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fchownat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fchownat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fchownat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fchownat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fchownat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchownat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchownat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fchownat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fchownat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fchownat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchownat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchownat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fchownat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchownat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchownat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fchownat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fchownat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fchownat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fchownat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fremovexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fremovexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fremovexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fremovexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fremovexattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fremovexattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fremovexattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fremovexattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fremovexattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_fsetxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fsetxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_fsetxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(fsetxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_fsetxattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit fsetxattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_fsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit fsetxattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_fsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_fsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fsetxattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_fsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit fsetxattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_fsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_fsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_fsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_ftruncate_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(ftruncate)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_ftruncate_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(ftruncate)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_ftruncate_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit ftruncate EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_ftruncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_ftruncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_ftruncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit ftruncate EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_ftruncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_ftruncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_ftruncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit ftruncate EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_ftruncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_ftruncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_ftruncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit ftruncate EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_ftruncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_ftruncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_ftruncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_lchown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lchown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_lchown_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lchown)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_lchown_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit lchown EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_lchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit lchown EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_lchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lchown EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_lchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lchown EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_lchown_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lchown_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lchown_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_lremovexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lremovexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_lremovexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lremovexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_lremovexattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit lremovexattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_lremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit lremovexattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_lremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lremovexattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_lremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lremovexattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_lremovexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lremovexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lremovexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_lsetxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lsetxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_lsetxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(lsetxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_lsetxattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit lsetxattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_lsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit lsetxattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_lsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_lsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lsetxattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_lsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit lsetxattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_lsetxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_lsetxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_lsetxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_open_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(open)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_open_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(open)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_open_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit open EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_open_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_open_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit open EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_open_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_open_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit open EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_open_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_open_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit open EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_open_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_open_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_open_by_handle_at_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(open_by_handle_at)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_open_by_handle_at_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(open_by_handle_at)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_open_by_handle_at_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit open_by_handle_at EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_open_by_handle_at_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_open_by_handle_at_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_by_handle_at_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit open_by_handle_at EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_open_by_handle_at_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_open_by_handle_at_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_by_handle_at_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit open_by_handle_at EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_open_by_handle_at_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_open_by_handle_at_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_by_handle_at_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit open_by_handle_at EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_open_by_handle_at_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_open_by_handle_at_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_open_by_handle_at_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_openat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(openat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_openat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(openat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_openat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit openat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_openat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_openat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_openat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit openat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_openat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_openat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_openat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit openat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_openat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_openat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_openat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit openat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_openat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_openat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_openat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_removexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(removexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_removexattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(removexattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_removexattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit removexattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_removexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_removexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_removexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit removexattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_removexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_removexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_removexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit removexattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_removexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_removexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_removexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit removexattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_removexattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_removexattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_removexattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_rename_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(rename)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_rename_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(rename)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_rename_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit rename EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_rename_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_rename_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_rename_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit rename EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_rename_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_rename_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_rename_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit rename EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_rename_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_rename_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_rename_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit rename EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_rename_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_rename_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_rename_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_renameat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(renameat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_renameat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(renameat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_renameat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit renameat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_renameat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_renameat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_renameat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit renameat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_renameat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_renameat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_renameat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit renameat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_renameat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_renameat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_renameat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit renameat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_renameat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_renameat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_renameat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_setxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(setxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_setxattr_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(setxattr)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_setxattr_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit setxattr EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_setxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_setxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_setxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit setxattr EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_setxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_setxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_setxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit setxattr EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_setxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_setxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_setxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit setxattr EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_setxattr_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_setxattr_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_setxattr_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_truncate_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(truncate)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_truncate_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(truncate)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_truncate_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit truncate EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_truncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_truncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_truncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit truncate EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_truncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_truncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_truncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit truncate EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_truncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_truncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_truncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit truncate EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_truncate_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_truncate_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_truncate_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_unlink_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(unlink)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_unlink_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(unlink)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_unlink_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit unlink EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_unlink_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_unlink_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlink_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit unlink EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_unlink_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_unlink_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlink_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit unlink EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_unlink_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_unlink_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlink_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit unlink EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_unlink_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_unlink_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlink_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_32bit_arufm_unlinkat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b32[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(unlinkat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule arch and syscal" datatype="string" id="oval:ssg-var_64bit_arufm_unlinkat_head:var:1" version="1">
          <oval:value>^[\s]*-a[\s]+always,exit[\s]+(?:-F[\s]+arch=b64[\s]+)(?:-S[\s]+(?:|(?:[\S]+,)+)(unlinkat)(?:|(?:,[\S]+)+))[\s]+</oval:value>
        </oval:constant_variable>
        <oval:constant_variable comment="audit rule auid and key" datatype="string" id="oval:ssg-var_arufm_unlinkat_tail:var:1" version="1">
          <oval:value>[\s]+(?:-F\s+auid&gt;=1000[\s]+)(?:-F\s+auid!=(unset|4294967295)[\s]+)(?:-k[\s]+|-F[\s]+key=)[\S]+[\s]*$</oval:value>
        </oval:constant_variable>
        <oval:local_variable comment="Expression to match 32bit unlinkat EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eacces_unlinkat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_unlinkat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlinkat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 32bit unlinkat EPERM EACCES syscall" datatype="string" id="oval:ssg-var_32bit_arufm_eperm_unlinkat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_32bit_arufm_unlinkat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlinkat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit unlinkat EACCES syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eacces_unlinkat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_unlinkat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EACCES)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlinkat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
        <oval:local_variable comment="Expression to match 64bit unlinkat EPERM syscall" datatype="string" id="oval:ssg-var_64bit_arufm_eperm_unlinkat_regex:var:1" version="1">
          <oval:concat>
            <oval:variable_component var_ref="oval:ssg-var_64bit_arufm_unlinkat_head:var:1"/>
            <oval:literal_component>(?:-F\s+exit=-EPERM)</oval:literal_component>
            <oval:variable_component var_ref="oval:ssg-var_arufm_unlinkat_tail:var:1"/>
          </oval:concat>
        </oval:local_variable>
      </oval:variables>
    </oval:oval_definitions>
  </ds:component>
  <ds:component id="scap_org.open-scap_comp_ssg-sle12-ocil.xml" timestamp="2019-04-18T11:25:44">
    <ns0:ocil xmlns:ns0="http://scap.nist.gov/schema/ocil/2.0">
      <ns0:generator>
        <ns0:product_name>xccdf-create-ocil.xslt from SCAP Security Guide</ns0:product_name>
        <ns0:product_version>ssg: 0.1.44</ns0:product_version>
        <ns0:schema_version>2.0</ns0:schema_version>
        <ns0:timestamp>2019-04-18T11:25:40+02:00</ns0:timestamp>
      </ns0:generator>
      <ns0:questionnaires>
        <ns0:questionnaire id="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1">
          <ns0:title>Disable KDump Kernel Crash Analyzer (kdump)</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_kdump_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_cron_enabled_ocil:questionnaire:1">
          <ns0:title>Enable cron Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_cron_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-ftp_present_banner_ocil:questionnaire:1">
          <ns0:title>Create Warning Banners for All FTP Users</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-ftp_present_banner_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-postfix_client_configure_mail_alias_ocil:questionnaire:1">
          <ns0:title>Configure System to Forward All Mail For The Root Account</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-postfix_client_configure_mail_alias_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_all_squash_exports_ocil:questionnaire:1">
          <ns0:title>Ensure All-Squashing Disabled On All Exports</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_all_squash_exports_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-chronyd_or_ntpd_set_maxpoll_ocil:questionnaire:1">
          <ns0:title>Configure Time Service Maxpoll Interval</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-chronyd_or_ntpd_set_maxpoll_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1">
          <ns0:title>Specify a Remote NTP Server</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-ntpd_specify_remote_server_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_ntp_enabled_ocil:questionnaire:1">
          <ns0:title>Enable the NTP Daemon</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_ntp_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1">
          <ns0:title>Enable the NTP Daemon</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_ntpd_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_timesyncd_enabled_ocil:questionnaire:1">
          <ns0:title>Enable systemd_timesyncd Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_timesyncd_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_host_based_files_ocil:questionnaire:1">
          <ns0:title>Remove Host-Based Authentication Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_host_based_files_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1">
          <ns0:title>Remove Rsh Trust Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_rsh_trust_files_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_user_host_based_files_ocil:questionnaire:1">
          <ns0:title>Remove User Host-Based Authentication Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_user_host_based_files_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1">
          <ns0:title>Uninstall telnet-server Package</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_telnet-server_removed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_sshd_private_key_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on SSH Server Private *_key Key Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_sshd_private_key_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_sshd_pub_key_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on SSH Server Public *.pub Key Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_sshd_pub_key_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_sshd_enabled_ocil:questionnaire:1">
          <ns0:title>Enable the OpenSSH Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_sshd_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_openssh_installed_ocil:questionnaire:1">
          <ns0:title>Install the OpenSSH Client and Server Package</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_openssh_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-disable_host_auth_ocil:questionnaire:1">
          <ns0:title>Disable Host-Based Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-disable_host_auth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1">
          <ns0:title>Allow Only SSH Protocol 2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_allow_only_protocol2_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_compression_ocil:questionnaire:1">
          <ns0:title>Disable Compression Or Set Compression to delayed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_compression_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1">
          <ns0:title>Disable SSH Access via Empty Passwords</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_empty_passwords_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_gssapi_auth_ocil:questionnaire:1">
          <ns0:title>Disable GSSAPI Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_gssapi_auth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_kerb_auth_ocil:questionnaire:1">
          <ns0:title>Disable Kerberos Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_kerb_auth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1">
          <ns0:title>Disable SSH Support for .rhosts Files</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_rhosts_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_rhosts_rsa_ocil:questionnaire:1">
          <ns0:title>Disable SSH Support for Rhosts RSA Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_rhosts_rsa_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1">
          <ns0:title>Disable SSH Root Login</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_root_login_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_disable_user_known_hosts_ocil:questionnaire:1">
          <ns0:title>Disable SSH Support for User Known Hosts</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_disable_user_known_hosts_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1">
          <ns0:title>Do Not Allow SSH Environment Options</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_enable_strictmodes_ocil:questionnaire:1">
          <ns0:title>Enable Use of Strict Mode Checking</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_enable_strictmodes_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1">
          <ns0:title>Enable SSH Warning Banner</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_enable_warning_banner_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_enable_x11_forwarding_ocil:questionnaire:1">
          <ns0:title>Enable Encrypted X11 Forwarding</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_enable_x11_forwarding_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_print_last_log_ocil:questionnaire:1">
          <ns0:title>Enable SSH Print Last Log</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_print_last_log_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1">
          <ns0:title>Set SSH Idle Timeout Interval</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_set_idle_timeout_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1">
          <ns0:title>Set SSH Client Alive Max Count</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_set_keepalive_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_set_loglevel_info_ocil:questionnaire:1">
          <ns0:title>Set LogLevel to INFO</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_set_loglevel_info_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_set_max_auth_tries_ocil:questionnaire:1">
          <ns0:title>Set SSH authentication attempt limit</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_set_max_auth_tries_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1">
          <ns0:title>Use Only DoD-approved encryption Ciphers</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_use_approved_ciphers_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1">
          <ns0:title>Use Only FIPS 140-2 Validated MACs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_use_approved_macs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_use_priv_separation_ocil:questionnaire:1">
          <ns0:title>Enable Use of Privilege Separation</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_use_priv_separation_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sshd_set_loglevel_verbose_ocil:questionnaire:1">
          <ns0:title>Set SSH Daemon LogLevel to VERBOSE</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sshd_set_loglevel_verbose_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1">
          <ns0:title>Configure SSSD's Memory Cache to Expire</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sssd_memcache_timeout_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1">
          <ns0:title>Configure SSSD to Expire Offline Credentials</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sssd_offline_cred_expiration_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-banner_etc_issue_ocil:questionnaire:1">
          <ns0:title>Modify the System Login Banner</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-banner_etc_issue_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-banner_etc_motd_ocil:questionnaire:1">
          <ns0:title>Modify the System Login Banner for Console Access</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-banner_etc_motd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_banner_enabled_ocil:questionnaire:1">
          <ns0:title>Enable GNOME3 Login Warning Banner</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_banner_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_login_banner_text_ocil:questionnaire:1">
          <ns0:title>Set the GNOME3 Login Warning Banner Text</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_login_banner_text_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1">
          <ns0:title>Enable GUI Warning Banner</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1">
          <ns0:title>Set GUI Warning Banner Text</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gui_login_dod_acknowledgement_ocil:questionnaire:1">
          <ns0:title>Display the Standard Mandatory DoD Notice and Consent Banner until Explicit Acknowledgement</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gui_login_dod_acknowledgement_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-banner_etc_gdm_banner_ocil:questionnaire:1">
          <ns0:title>Modify the System GUI Login Banner</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-banner_etc_gdm_banner_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-display_login_attempts_ocil:questionnaire:1">
          <ns0:title>Ensure PAM Displays Last Logon/Access Notification</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-display_login_attempts_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-faildelay_ocil:questionnaire:1">
          <ns0:title>Enforce Delay After Failed Logon Attempts</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-faildelay_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-pam_disable_automatic_configuration_ocil:questionnaire:1">
          <ns0:title>The PAM configuration should not be changed automatically</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-pam_disable_automatic_configuration_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1">
          <ns0:title>Limit Password Reuse</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_passwords_pam_tally2_ocil:questionnaire:1">
          <ns0:title>Set Deny For Failed Password Attempts</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_passwords_pam_tally2_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_dcredit_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Digit Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_dcredit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_difok_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Different Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_difok_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_lcredit_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Lowercase Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_lcredit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_maxrepeat_ocil:questionnaire:1">
          <ns0:title>Set Password to Maximum of Three Consecutive Repeating Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_maxrepeat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_minclass_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Different Categories</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_minclass_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_minlen_ocil:questionnaire:1">
          <ns0:title>Set Password Minimum Length</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_minlen_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_ocredit_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Special Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_ocredit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_retry_ocil:questionnaire:1">
          <ns0:title>Set Password Retry Prompts Permitted Per-Session</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_retry_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-cracklib_accounts_password_pam_ucredit_ocil:questionnaire:1">
          <ns0:title>Set Password Strength Minimum Uppercase Characters</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-cracklib_accounts_password_pam_ucredit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1">
          <ns0:title>Set Password Hashing Algorithm in /etc/login.defs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1">
          <ns0:title>Set PAM's Password Hashing Algorithm</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_password_hashing_min_rounds_logindefs_ocil:questionnaire:1">
          <ns0:title>Set Password Hashing Rounds in /etc/login.defs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_password_hashing_min_rounds_logindefs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_password_hashing_algorithm_commonauth_ocil:questionnaire:1">
          <ns0:title>Set PAM's Password Hashing Algorithm for Logins</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_password_hashing_algorithm_commonauth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1">
          <ns0:title>Disable Ctrl-Alt-Del Reboot Activation</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-vlock_installed_ocil:questionnaire:1">
          <ns0:title>Check for vlock Command</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-vlock_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-install_smartcard_packages_ocil:questionnaire:1">
          <ns0:title>Install Smart Card Packages For Multifactor Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-install_smartcard_packages_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-smartcard_auth_ocil:questionnaire:1">
          <ns0:title>Enable Smart Card Login</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-smartcard_auth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-smartcard_configure_cert_checking_ocil:questionnaire:1">
          <ns0:title>Configure Smart Card Certificate Status Checking</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-smartcard_configure_cert_checking_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-smartcard_pam_enabled_ocil:questionnaire:1">
          <ns0:title>Enable Smart Card Logins in PAM</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-smartcard_pam_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-smartcard_configure_ca_ocil:questionnaire:1">
          <ns0:title>Configure Smart Card Certificate Authority Validation</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-smartcard_configure_ca_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_unique_id_ocil:questionnaire:1">
          <ns0:title>Ensure All Accounts on the System Have Unique User IDs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_unique_id_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1">
          <ns0:title>Set Account Expiration Following Inactivity</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_disable_post_pw_expiration_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1">
          <ns0:title>Assign Expiration Date to Temporary Accounts</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_temp_expire_date_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_unique_name_ocil:questionnaire:1">
          <ns0:title>Ensure All Accounts on the System Have Unique Names</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_unique_name_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_use_centralized_automated_auth_ocil:questionnaire:1">
          <ns0:title>Use Centralized and Automated Authentication</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_use_centralized_automated_auth_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_minimum_age_shadow_ocil:questionnaire:1">
          <ns0:title>Set Account Password Minimum Lifetime</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_minimum_age_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_maximum_age_shadow_ocil:questionnaire:1">
          <ns0:title>Set Account Password Maximum Lifetime</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_maximum_age_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-account_emergency_admin_ocil:questionnaire:1">
          <ns0:title>Never Automatically Remove or Disable Emergency Administrator Accounts</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-account_emergency_admin_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-policy_temp_passwords_immediate_change_ocil:questionnaire:1">
          <ns0:title>Policy Requires Immediate Change of Temporary Passwords</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-policy_temp_passwords_immediate_change_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1">
          <ns0:title>Set Password Maximum Age</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1">
          <ns0:title>Set Password Minimum Age</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1">
          <ns0:title>Set Password Minimum Length in login.defs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1">
          <ns0:title>Set Password Warning Age</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1">
          <ns0:title>Verify All Account Password Hashes are Shadowed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_password_all_shadowed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1">
          <ns0:title>All GIDs referenced in /etc/passwd must be defined in /etc/group</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gid_passwd_group_same_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_empty_passwords_ocil:questionnaire:1">
          <ns0:title>Prevent Login to Accounts With Empty Password</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_empty_passwords_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_netrc_files_ocil:questionnaire:1">
          <ns0:title>Verify No netrc Files Exist</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_netrc_files_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_password_all_shadowed_sha512_ocil:questionnaire:1">
          <ns0:title>Verify All Account Password Hashes are Shadowed with SHA512</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_password_all_shadowed_sha512_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1">
          <ns0:title>Verify Only Root Has UID 0</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_no_uid_except_zero_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1">
          <ns0:title>Direct root Logins Not Allowed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_direct_root_logins_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_password_auth_for_systemaccounts_ocil:questionnaire:1">
          <ns0:title>Ensure that System Accounts Are Locked</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1">
          <ns0:title>Restrict Serial Port Root Logins</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-restrict_serial_port_logins_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1">
          <ns0:title>Restrict Virtual Console Root Logins</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-securetty_root_login_console_only_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_have_homedir_login_defs_ocil:questionnaire:1">
          <ns0:title>Ensure Home Directories are Created for New Users</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_have_homedir_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_logon_fail_delay_ocil:questionnaire:1">
          <ns0:title>Ensure the Logon Failure Delay is Set Correctly in login.defs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_logon_fail_delay_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1">
          <ns0:title>Limit the Number of Concurrent Login Sessions Allowed Per User</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_tmout_ocil:questionnaire:1">
          <ns0:title>Set Interactive Session Timeout</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_tmout_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_user_dot_no_world_writable_programs_ocil:questionnaire:1">
          <ns0:title>User Initialization Files Must Not Run World-Writable Programs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_user_dot_no_world_writable_programs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_user_home_paths_only_ocil:questionnaire:1">
          <ns0:title>Ensure that Users Path Contains Only Local Directories</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_user_home_paths_only_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_user_interactive_home_directory_defined_ocil:questionnaire:1">
          <ns0:title>All Interactive Users Must Have A Home Directory Defined</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_user_interactive_home_directory_defined_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_user_interactive_home_directory_exists_ocil:questionnaire:1">
          <ns0:title>All Interactive Users Home Directories Must Exist</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_user_interactive_home_directory_exists_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_users_home_files_groupownership_ocil:questionnaire:1">
          <ns0:title>All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary User</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_users_home_files_groupownership_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permission_user_init_files_ocil:questionnaire:1">
          <ns0:title>Ensure All User Initialization Files Have Mode 0740 Or Less Permissive</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permission_user_init_files_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_home_directories_ocil:questionnaire:1">
          <ns0:title>All Interactive User Home Directories Must Have mode 0750 Or Less Permissive</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_home_directories_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1">
          <ns0:title>Ensure that User Home Directories are not Group-Writable or World-Readable</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_home_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1">
          <ns0:title>Ensure that Root's Path Does Not Include World or Group-Writable Directories</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1">
          <ns0:title>Ensure the Default Umask is Set Correctly in login.defs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1">
          <ns0:title>Ensure the Default Umask is Set Correctly in /etc/profile</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_umask_etc_profile_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_umask_interactive_users_ocil:questionnaire:1">
          <ns0:title>Ensure the Default Umask is Set Correctly For Interactive Users</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_umask_interactive_users_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1">
          <ns0:title>Enable auditd Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_auditd_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Mandatory Access Controls</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_mac_modification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on Exporting to Media (successful)</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_media_export_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Network Environment</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects System Administrator Actions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_group_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information - /etc/group</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_group_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_gshadow_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information - /etc/gshadow</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_gshadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_opasswd_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information - /etc/security/opasswd</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_opasswd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_passwd_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information - /etc/passwd</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_passwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_shadow_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify User/Group Information - /etc/shadow</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-directory_access_var_log_audit_ocil:questionnaire:1">
          <ns0:title>Record Access Events to Audit Log directory</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-directory_access_var_log_audit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-directory_permissions_var_log_audit_ocil:questionnaire:1">
          <ns0:title>System Audit Logs Must Have Mode 0750 or Less Permissive</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-directory_permissions_var_log_audit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1">
          <ns0:title>System Audit Logs Must Be Owned By Root</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_ownership_var_log_audit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_suid_privilege_function_ocil:questionnaire:1">
          <ns0:title>Record Events When Privileged Executables Are Run</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_suid_privilege_function_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_enable_syscall_auditing_ocil:questionnaire:1">
          <ns0:title>Remove Default Configuration to Disable Syscall Auditing</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_enable_syscall_auditing_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - chmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - chown</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fchmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fchmodat</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fchown</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fchownat</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fremovexattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - fsetxattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - lchown</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - lremovexattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - lsetxattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - removexattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - setxattr</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_mount_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - mount</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_mount_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_umount_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - umount</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_umount_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_dac_modification_umount2_ocil:questionnaire:1">
          <ns0:title>Record Events that Modify the System's Discretionary Access Controls - umount2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_dac_modification_umount2_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_chcon_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run chcon</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_chcon_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_chacl_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run chacl</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_chacl_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_chmod_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run chmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_chmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_crontab_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run crontab</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_crontab_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_rm_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run rm</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_rm_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_setfacl_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run setfacl</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_setfacl_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_execution_ssh-agent_ocil:questionnaire:1">
          <ns0:title>Record Any Attempts to Run ssh-agent</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_execution_ssh-agent_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects File Deletion Events by User</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_file_deletion_events_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on Kernel Module Loading and Unloading</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_delete_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on Kernel Module Unloading - delete_module</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_finit_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_finit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_init_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on Kernel Module Loading - init_module</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_init_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_login_events_lastlog_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter Logon and Logout Events - lastlog</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_login_events_lastlog_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_login_events_tallylog_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter Logon and Logout Events - tallylog</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_login_events_tallylog_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_login_events_faillog_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter Failed Logon and Logout Events - faillog</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_login_events_faillog_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_chage_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - chage</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_chage_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_chsh_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - chsh</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_chsh_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_gpasswd_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_gpasswd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_newgrp_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - newgrp</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_newgrp_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_passwd_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - passwd</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_passwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_ssh_keysign_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_ssh_keysign_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_su_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - su</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_su_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_sudo_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - sudo</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_sudo_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_sudoedit_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_sudoedit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_chfn_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - chfn</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_chfn_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_insmod_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - insmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_insmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_kmod_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - kmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_kmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_modprobe_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - modprobe</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_modprobe_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_passmass_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - passmass</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_passmass_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_rmmod_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - rmmod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_rmmod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_privileged_commands_usermod_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Information on the Use of Privileged Commands - usermod</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_privileged_commands_usermod_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1">
          <ns0:title>Record attempts to alter time through adjtimex</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_time_adjtimex_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter Time Through clock_settime</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_time_clock_settime_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1">
          <ns0:title>Record attempts to alter time through settimeofday</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_time_settimeofday_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter Time Through stime</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_time_stime_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1">
          <ns0:title>Record Attempts to Alter the localtime File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1">
          <ns0:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_creat_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - creat</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - ftruncate</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - open</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_open_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - open_by_handle_at</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_openat_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - openat</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_openat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_ocil:questionnaire:1">
          <ns0:title>Record Unauthorized Access Attempts to Files (unsuccessful) - truncate</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_configure_remote_server_ocil:questionnaire:1">
          <ns0:title>Configure audispd Plugin To Send Logs To Remote Server</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_configure_remote_server_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_disk_full_action_ocil:questionnaire:1">
          <ns0:title>Configure audispd's Plugin disk_full_action When Disk Is Full</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_disk_full_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_encrypt_sent_records_ocil:questionnaire:1">
          <ns0:title>Encrypt Audit Records Sent With audispd Plugin</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_network_failure_action_ocil:questionnaire:1">
          <ns0:title>Configure audispd's Plugin network_failure_action On Network Failure</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_network_failure_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1">
          <ns0:title>Configure auditd to use audispd's syslog plugin</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_disk_error_action_ocil:questionnaire:1">
          <ns0:title>Configure auditd Disk Error Action on Disk Error</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_disk_error_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_disk_full_action_ocil:questionnaire:1">
          <ns0:title>Configure auditd Disk Full Action when Disk Space Is Full</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_disk_full_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1">
          <ns0:title>Configure auditd mail_acct Action on Low Disk Space</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1">
          <ns0:title>Configure auditd admin_space_left Action on Low Disk Space</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1">
          <ns0:title>Configure auditd Max Log File Size</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1">
          <ns0:title>Configure auditd max_log_file_action Upon Reaching Maximum Log Size</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1">
          <ns0:title>Configure auditd Number of Logs Retained</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_num_logs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_space_left_ocil:questionnaire:1">
          <ns0:title>Configure auditd space_left on Low Disk Space</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_space_left_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1">
          <ns0:title>Configure auditd space_left Action on Low Disk Space</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_ocil:questionnaire:1">
          <ns0:title>Configure a Sufficiently Large Partition for Audit Logs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-grub2_password_ocil:questionnaire:1">
          <ns0:title>Set Boot Loader Password in grub2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-grub2_password_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-grub2_uefi_password_ocil:questionnaire:1">
          <ns0:title>Set the UEFI Boot Loader Password</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-grub2_uefi_password_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1">
          <ns0:title>Ensure rsyslog is Installed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_rsyslog_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1">
          <ns0:title>Enable rsyslog Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_rsyslog_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-ensure_rtc_utc_configuration_ocil:questionnaire:1">
          <ns0:title>Ensure real-time clock is set to UTC</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-ensure_rtc_utc_configuration_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1">
          <ns0:title>Ensure Log Files Are Owned By Appropriate Group</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-rsyslog_files_groupownership_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1">
          <ns0:title>Ensure Log Files Are Owned By Appropriate User</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-rsyslog_files_ownership_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1">
          <ns0:title>Ensure System Log Files Have Correct Permissions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-rsyslog_files_permissions_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1">
          <ns0:title>Ensure Logrotate Runs Periodically</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-ensure_logrotate_activated_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_syslogng_installed_ocil:questionnaire:1">
          <ns0:title>Ensure syslog-ng is Installed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_syslogng_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_syslogng_enabled_ocil:questionnaire:1">
          <ns0:title>Enable syslog-ng Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_syslogng_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1">
          <ns0:title>Ensure Logs Sent To Remote Host</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-rsyslog_remote_loghost_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-network_sniffer_disabled_ocil:questionnaire:1">
          <ns0:title>Ensure System is Not Acting as a Network Sniffer</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-network_sniffer_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1">
          <ns0:title>Verify ip6tables Enabled if Using IPv6</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_ip6tables_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1">
          <ns0:title>Verify iptables Enabled</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_iptables_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1">
          <ns0:title>Set Default ip6tables Policy for Incoming Packets</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_ip6tables_default_rule_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1">
          <ns0:title>Set Default iptables Policy for Incoming Packets</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_iptables_default_rule_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1">
          <ns0:title>Set Default iptables Policy for Forwarded Packets</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-set_iptables_default_rule_forward_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter for Accepting IPv6 Source-Routed Packets for All Interfaces</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1">
          <ns0:title>Configure Accepting IPv6 Redirects By Default</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1">
          <ns0:title>Disable IPv6 Networking Support Automatic Loading</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter for Accepting IPv4 Source-Routed Packets for All Interfaces</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter for Accepting ICMP Redirects By Default</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter for Accepting Source-Routed Packets By Default</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1">
          <ns0:title>Configure Kernel Parameter to Use TCP Syncookies</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1">
          <ns0:title>Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1">
          <ns0:title>Disable Kernel Parameter for Sending ICMP Redirects by Default</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1">
          <ns0:title>Disable Kernel Parameter for IP Forwarding</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1">
          <ns0:title>Disable RDS Support</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-kernel_module_rds_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1">
          <ns0:title>Disable TIPC Support</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-kernel_module_tipc_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-wireless_disable_interfaces_ocil:questionnaire:1">
          <ns0:title>Deactivate Wireless Network Interfaces</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-wireless_disable_interfaces_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-susefirewall2_ddos_protection_ocil:questionnaire:1">
          <ns0:title>Enable DoS Protections in SuSEfirewall2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-susefirewall2_ddos_protection_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-susefirewall2_only_required_services_ocil:questionnaire:1">
          <ns0:title>Only Allow Authorized Network Services in SuSEfirewall2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-susefirewall2_only_required_services_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_SuSEfirewall2_enabled_ocil:questionnaire:1">
          <ns0:title>Enable the SuSEfirewall 2</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_SuSEfirewall2_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1">
          <ns0:title>Verify that All World-Writable Directories Have Sticky Bits Set</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_systemmap_ocil:questionnaire:1">
          <ns0:title>Verify that local System.map file (if exists) is readable only by root</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_systemmap_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1">
          <ns0:title>Ensure All SGID Executables Are Authorized</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1">
          <ns0:title>Ensure All SUID Executables Are Authorized</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1">
          <ns0:title>Ensure No World-Writable Files Exist</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1">
          <ns0:title>Ensure All Files Are Owned by a Group</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_ungroupowned_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1">
          <ns0:title>Ensure All Files Are Owned by a User</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-no_files_unowned_by_user_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_fs_protected_hardlinks_ocil:questionnaire:1">
          <ns0:title>Disallow creating symlinks to a file you not own</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_fs_protected_hardlinks_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_fs_protected_symlinks_ocil:questionnaire:1">
          <ns0:title>Disallow creating symlinks to a file you not own</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_fs_protected_symlinks_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dir_perms_world_writable_system_groupowned_ocil:questionnaire:1">
          <ns0:title>Ensure All World-Writable Directories Are Group-Owned by a System Group</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dir_perms_world_writable_system_groupowned_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1">
          <ns0:title>Verify Group Who Owns group File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_groupowner_etc_group_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1">
          <ns0:title>Verify Group Who Owns gshadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1">
          <ns0:title>Verify Group Who Owns passwd File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_groupowner_etc_passwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_groupowner_etc_shadow_ocil:questionnaire:1">
          <ns0:title>Verify Group Who Owns shadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_groupowner_etc_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1">
          <ns0:title>Verify User Who Owns group File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_owner_etc_group_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1">
          <ns0:title>Verify User Who Owns gshadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_owner_etc_gshadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1">
          <ns0:title>Verify User Who Owns passwd File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_owner_etc_passwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_owner_etc_shadow_ocil:questionnaire:1">
          <ns0:title>Verify User Who Owns shadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_owner_etc_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on group File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_etc_group_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on gshadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_etc_gshadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on passwd File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_etc_passwd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1">
          <ns0:title>Verify Permissions on shadow File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_etc_shadow_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_etc_security_opasswd_ocil:questionnaire:1">
          <ns0:title>Verify Permissions and Ownership of Old Passwords File</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_etc_security_opasswd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1">
          <ns0:title>Verify that System Executables Have Root Ownership</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_ownership_binary_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1">
          <ns0:title>Verify that Shared Library Files Have Root Ownership</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_ownership_library_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1">
          <ns0:title>Verify that System Executables Have Restrictive Permissions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_binary_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1">
          <ns0:title>Verify that Shared Library Files Have Restrictive Permissions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_library_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1">
          <ns0:title>Disable the Automounter</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_autofs_disabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1">
          <ns0:title>Disable Core Dumps for SUID programs</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_kernel_kptr_restrict_ocil:questionnaire:1">
          <ns0:title>Restrict Exposed Kernel Pointer Addresses Access</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_kernel_kptr_restrict_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1">
          <ns0:title>Enable Randomized Layout of Virtual Address Space</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-file_permissions_var_log_messages_ocil:questionnaire:1">
          <ns0:title>Verify that local /var/log/messages is not world-readable</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-file_permissions_var_log_messages_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-permissions_local_var_log_audit_ocil:questionnaire:1">
          <ns0:title>Verify that Local Logs of the audit Daemon are not World-Readable</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-permissions_local_var_log_audit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-permissions_local_audit_binaries_ocil:questionnaire:1">
          <ns0:title>Verify Permissions of Local Logs of audit Tools</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-permissions_local_audit_binaries_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-run_chkstat_ocil:questionnaire:1">
          <ns0:title>OS commands and libraries must have the proper permissions to protect from unauthorized access</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-run_chkstat_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-encrypt_partitions_ocil:questionnaire:1">
          <ns0:title>Encrypt Partitions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-encrypt_partitions_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_home_ocil:questionnaire:1">
          <ns0:title>Ensure /home Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_home_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_srv_ocil:questionnaire:1">
          <ns0:title>Ensure /srv Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_srv_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_tmp_ocil:questionnaire:1">
          <ns0:title>Ensure /tmp Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_tmp_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_var_ocil:questionnaire:1">
          <ns0:title>Ensure /var Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_var_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_var_log_ocil:questionnaire:1">
          <ns0:title>Ensure /var/log Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_var_log_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1">
          <ns0:title>Ensure /var/log/audit Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_var_log_audit_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-partition_for_home_dirs_ocil:questionnaire:1">
          <ns0:title>Ensure Home Directories are Located On Separate Partition</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-partition_for_home_dirs_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-enable_dconf_user_profile_ocil:questionnaire:1">
          <ns0:title>Configure GNOME3 DConf User Profile</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-enable_dconf_user_profile_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_use_text_backend_ocil:questionnaire:1">
          <ns0:title>Force dconf to use the textfiles instead of a binary DB</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_use_text_backend_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1">
          <ns0:title>Disable the User List</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1">
          <ns0:title>Disable the GNOME Login Restart and Shutdown Buttons</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1">
          <ns0:title>Disable GDM Automatic Login</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1">
          <ns0:title>Disable GNOME Automounting</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_automount_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1">
          <ns0:title>Disable All GNOME Thumbnailers</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1">
          <ns0:title>Disable WIFI Network Connection Creation in GNOME</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1">
          <ns0:title>Disable WIFI Network Disconnect Notification in GNOME</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1">
          <ns0:title>Disable WIFI Network Connection Notification in GNOME</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_screensaver_idle_delay_ocil:questionnaire:1">
          <ns0:title>Set GNOME3 Screensaver Inactivity Timeout</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_screensaver_idle_delay_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_screensaver_mode_blank_ocil:questionnaire:1">
          <ns0:title>Implement Blank Screensaver</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_screensaver_mode_blank_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screen_locking_keybindings_ocil:questionnaire:1">
          <ns0:title>Set GNOME Screen Locking Keybindings</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screen_locking_keybindings_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1">
          <ns0:title>GNOME Desktop Screensaver Mandatory Use</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1">
          <ns0:title>Set GNOME Login Inactivity Timeout</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1">
          <ns0:title>Enable Screen Lock Activation After Idle Period</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1">
          <ns0:title>Set GNOME Login Maximum Allowed Inactivity Action</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1">
          <ns0:title>Set GNOME Login Maximum Allowed Inactivity</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1">
          <ns0:title>Implement Blank Screensaver</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_enable_lock_screen_ocil:questionnaire:1">
          <ns0:title>Enable GNOME3 Lock Screen</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_enable_lock_screen_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1">
          <ns0:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1">
          <ns0:title>Disable the GNOME Clock Temperature Feature</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1">
          <ns0:title>Disable the GNOME Clock Weather Feature</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1">
          <ns0:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-installed_OS_is_FIPS_certified_ocil:questionnaire:1">
          <ns0:title>The Installed Operating System Is FIPS 140-2 Certified</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-installed_OS_is_FIPS_certified_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1">
          <ns0:title>The Installed Operating System Is Vendor Supported and Certified</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-installed_OS_is_certified_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-configure_crypto_policy_ocil:questionnaire:1">
          <ns0:title>Configure System Cryptography Policy</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-configure_crypto_policy_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-configure_user_data_backups_ocil:questionnaire:1">
          <ns0:title>Configure Backups of User Data</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-configure_user_data_backups_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-enable_dracut_fips_module_ocil:questionnaire:1">
          <ns0:title>Enable Dracut FIPS Module</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-enable_dracut_fips_module_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-enable_fips_mode_ocil:questionnaire:1">
          <ns0:title>Enable FIPS Mode</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-enable_fips_mode_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sysctl_crypto_fips_enabled_ocil:questionnaire:1">
          <ns0:title>Set kernel parameter 'crypto.fips_enabled' to 1</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sysctl_crypto_fips_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_build_database_ocil:questionnaire:1">
          <ns0:title>Build and Test AIDE Database</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_build_database_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1">
          <ns0:title>Configure Periodic Execution of AIDE</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_periodic_cron_checking_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_scan_notification_ocil:questionnaire:1">
          <ns0:title>Configure Notification of Post-AIDE Scan Details</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_scan_notification_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_verify_acls_ocil:questionnaire:1">
          <ns0:title>Configure AIDE to Verify Access Control Lists (ACLs)</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_verify_acls_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_verify_ext_attributes_ocil:questionnaire:1">
          <ns0:title>Configure AIDE to Verify Extended Attributes</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_verify_ext_attributes_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_aide_installed_ocil:questionnaire:1">
          <ns0:title>Install AIDE</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_aide_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-aide_check_audit_tools_ocil:questionnaire:1">
          <ns0:title>Configure AIDE to Verify the Audit Tools</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-aide_check_audit_tools_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-accounts_authorized_local_users_ocil:questionnaire:1">
          <ns0:title>Only Authorized Local User Accounts Exist on Operating System</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-accounts_authorized_local_users_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sudo_remove_no_authenticate_ocil:questionnaire:1">
          <ns0:title>Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sudo_remove_no_authenticate_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sudo_remove_nopasswd_ocil:questionnaire:1">
          <ns0:title>Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sudo_remove_nopasswd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sudo_require_authentication_ocil:questionnaire:1">
          <ns0:title>Ensure Users Re-Authenticate for Privilege Escalation - sudo</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sudo_require_authentication_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-sudo_vdsm_nopasswd_ocil:questionnaire:1">
          <ns0:title>Only the VDSM User Can Use sudo NOPASSWD</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-sudo_vdsm_nopasswd_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-clean_components_post_updating_ocil:questionnaire:1">
          <ns0:title>Ensure zypper Removes Previous Package Versions</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-clean_components_post_updating_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1">
          <ns0:title>Ensure gpgcheck Enabled In Main zypper Configuration</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1">
          <ns0:title>Ensure Software Patches Installed</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-security_patches_up_to_date_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-blacklist_usb-storage_ocil:questionnaire:1">
          <ns0:title>Disable the usb-storage Kernel Module</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-blacklist_usb-storage_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-apparmor_configured_ocil:questionnaire:1">
          <ns0:title>Ensure AppArmor is Active and Configured</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-apparmor_configured_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-service_apparmor_enabled_ocil:questionnaire:1">
          <ns0:title>Enable apparmor Service</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-service_apparmor_enabled_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
        <ns0:questionnaire id="ocil:ssg-package_pam_apparmor_installed_ocil:questionnaire:1">
          <ns0:title>Install the pam_apparmor Package</ns0:title>
          <ns0:actions>
            <ns0:test_action_ref>ocil:ssg-package_pam_apparmor_installed_action:testaction:1</ns0:test_action_ref>
          </ns0:actions>
        </ns0:questionnaire>
      </ns0:questionnaires>
      <ns0:test_actions>
        <ns0:boolean_question_test_action id="ocil:ssg-service_kdump_disabled_action:testaction:1" question_ref="ocil:ssg-service_kdump_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_cron_enabled_action:testaction:1" question_ref="ocil:ssg-service_cron_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-ftp_present_banner_action:testaction:1" question_ref="ocil:ssg-ftp_present_banner_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-postfix_client_configure_mail_alias_action:testaction:1" question_ref="ocil:ssg-postfix_client_configure_mail_alias_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_all_squash_exports_action:testaction:1" question_ref="ocil:ssg-no_all_squash_exports_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-chronyd_or_ntpd_set_maxpoll_action:testaction:1" question_ref="ocil:ssg-chronyd_or_ntpd_set_maxpoll_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-ntpd_specify_remote_server_action:testaction:1" question_ref="ocil:ssg-ntpd_specify_remote_server_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_ntp_enabled_action:testaction:1" question_ref="ocil:ssg-service_ntp_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_ntpd_enabled_action:testaction:1" question_ref="ocil:ssg-service_ntpd_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_timesyncd_enabled_action:testaction:1" question_ref="ocil:ssg-service_timesyncd_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_host_based_files_action:testaction:1" question_ref="ocil:ssg-no_host_based_files_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_rsh_trust_files_action:testaction:1" question_ref="ocil:ssg-no_rsh_trust_files_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_user_host_based_files_action:testaction:1" question_ref="ocil:ssg-no_user_host_based_files_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_telnet-server_removed_action:testaction:1" question_ref="ocil:ssg-package_telnet-server_removed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_sshd_private_key_action:testaction:1" question_ref="ocil:ssg-file_permissions_sshd_private_key_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_sshd_pub_key_action:testaction:1" question_ref="ocil:ssg-file_permissions_sshd_pub_key_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_sshd_enabled_action:testaction:1" question_ref="ocil:ssg-service_sshd_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_openssh_installed_action:testaction:1" question_ref="ocil:ssg-package_openssh_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-disable_host_auth_action:testaction:1" question_ref="ocil:ssg-disable_host_auth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_allow_only_protocol2_action:testaction:1" question_ref="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_compression_action:testaction:1" question_ref="ocil:ssg-sshd_disable_compression_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_empty_passwords_action:testaction:1" question_ref="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_gssapi_auth_action:testaction:1" question_ref="ocil:ssg-sshd_disable_gssapi_auth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_kerb_auth_action:testaction:1" question_ref="ocil:ssg-sshd_disable_kerb_auth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_rhosts_action:testaction:1" question_ref="ocil:ssg-sshd_disable_rhosts_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_rhosts_rsa_action:testaction:1" question_ref="ocil:ssg-sshd_disable_rhosts_rsa_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_root_login_action:testaction:1" question_ref="ocil:ssg-sshd_disable_root_login_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_disable_user_known_hosts_action:testaction:1" question_ref="ocil:ssg-sshd_disable_user_known_hosts_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1" question_ref="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_enable_strictmodes_action:testaction:1" question_ref="ocil:ssg-sshd_enable_strictmodes_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_enable_warning_banner_action:testaction:1" question_ref="ocil:ssg-sshd_enable_warning_banner_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_enable_x11_forwarding_action:testaction:1" question_ref="ocil:ssg-sshd_enable_x11_forwarding_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_print_last_log_action:testaction:1" question_ref="ocil:ssg-sshd_print_last_log_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_set_idle_timeout_action:testaction:1" question_ref="ocil:ssg-sshd_set_idle_timeout_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_set_keepalive_action:testaction:1" question_ref="ocil:ssg-sshd_set_keepalive_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_set_loglevel_info_action:testaction:1" question_ref="ocil:ssg-sshd_set_loglevel_info_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_set_max_auth_tries_action:testaction:1" question_ref="ocil:ssg-sshd_set_max_auth_tries_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_use_approved_ciphers_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_use_approved_macs_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_macs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_use_priv_separation_action:testaction:1" question_ref="ocil:ssg-sshd_use_priv_separation_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sshd_set_loglevel_verbose_action:testaction:1" question_ref="ocil:ssg-sshd_set_loglevel_verbose_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sssd_memcache_timeout_action:testaction:1" question_ref="ocil:ssg-sssd_memcache_timeout_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sssd_offline_cred_expiration_action:testaction:1" question_ref="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-banner_etc_issue_action:testaction:1" question_ref="ocil:ssg-banner_etc_issue_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-banner_etc_motd_action:testaction:1" question_ref="ocil:ssg-banner_etc_motd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_banner_enabled_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_banner_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_login_banner_text_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_login_banner_text_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gui_login_dod_acknowledgement_action:testaction:1" question_ref="ocil:ssg-gui_login_dod_acknowledgement_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-banner_etc_gdm_banner_action:testaction:1" question_ref="ocil:ssg-banner_etc_gdm_banner_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-display_login_attempts_action:testaction:1" question_ref="ocil:ssg-display_login_attempts_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-faildelay_action:testaction:1" question_ref="ocil:ssg-faildelay_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-pam_disable_automatic_configuration_action:testaction:1" question_ref="ocil:ssg-pam_disable_automatic_configuration_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_tally2_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_tally2_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_dcredit_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_dcredit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_difok_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_difok_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_lcredit_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_lcredit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_maxrepeat_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_maxrepeat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_minclass_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_minclass_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_minlen_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_minlen_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_ocredit_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_ocredit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_retry_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_retry_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-cracklib_accounts_password_pam_ucredit_action:testaction:1" question_ref="ocil:ssg-cracklib_accounts_password_pam_ucredit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_password_hashing_min_rounds_logindefs_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_min_rounds_logindefs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_commonauth_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_commonauth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-vlock_installed_action:testaction:1" question_ref="ocil:ssg-vlock_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-install_smartcard_packages_action:testaction:1" question_ref="ocil:ssg-install_smartcard_packages_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-smartcard_auth_action:testaction:1" question_ref="ocil:ssg-smartcard_auth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-smartcard_configure_cert_checking_action:testaction:1" question_ref="ocil:ssg-smartcard_configure_cert_checking_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-smartcard_pam_enabled_action:testaction:1" question_ref="ocil:ssg-smartcard_pam_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-smartcard_configure_ca_action:testaction:1" question_ref="ocil:ssg-smartcard_configure_ca_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_unique_id_action:testaction:1" question_ref="ocil:ssg-account_unique_id_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_disable_post_pw_expiration_action:testaction:1" question_ref="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_temp_expire_date_action:testaction:1" question_ref="ocil:ssg-account_temp_expire_date_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_unique_name_action:testaction:1" question_ref="ocil:ssg-account_unique_name_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_use_centralized_automated_auth_action:testaction:1" question_ref="ocil:ssg-account_use_centralized_automated_auth_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_minimum_age_shadow_action:testaction:1" question_ref="ocil:ssg-account_minimum_age_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_maximum_age_shadow_action:testaction:1" question_ref="ocil:ssg-account_maximum_age_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-account_emergency_admin_action:testaction:1" question_ref="ocil:ssg-account_emergency_admin_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-policy_temp_passwords_immediate_change_action:testaction:1" question_ref="ocil:ssg-policy_temp_passwords_immediate_change_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_password_all_shadowed_action:testaction:1" question_ref="ocil:ssg-accounts_password_all_shadowed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gid_passwd_group_same_action:testaction:1" question_ref="ocil:ssg-gid_passwd_group_same_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_empty_passwords_action:testaction:1" question_ref="ocil:ssg-no_empty_passwords_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_netrc_files_action:testaction:1" question_ref="ocil:ssg-no_netrc_files_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_password_all_shadowed_sha512_action:testaction:1" question_ref="ocil:ssg-accounts_password_all_shadowed_sha512_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_no_uid_except_zero_action:testaction:1" question_ref="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_direct_root_logins_action:testaction:1" question_ref="ocil:ssg-no_direct_root_logins_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1" question_ref="ocil:ssg-no_password_auth_for_systemaccounts_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-restrict_serial_port_logins_action:testaction:1" question_ref="ocil:ssg-restrict_serial_port_logins_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-securetty_root_login_console_only_action:testaction:1" question_ref="ocil:ssg-securetty_root_login_console_only_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_have_homedir_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_have_homedir_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_logon_fail_delay_action:testaction:1" question_ref="ocil:ssg-accounts_logon_fail_delay_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1" question_ref="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_tmout_action:testaction:1" question_ref="ocil:ssg-accounts_tmout_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_user_dot_no_world_writable_programs_action:testaction:1" question_ref="ocil:ssg-accounts_user_dot_no_world_writable_programs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_user_home_paths_only_action:testaction:1" question_ref="ocil:ssg-accounts_user_home_paths_only_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_user_interactive_home_directory_defined_action:testaction:1" question_ref="ocil:ssg-accounts_user_interactive_home_directory_defined_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_user_interactive_home_directory_exists_action:testaction:1" question_ref="ocil:ssg-accounts_user_interactive_home_directory_exists_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_users_home_files_groupownership_action:testaction:1" question_ref="ocil:ssg-accounts_users_home_files_groupownership_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permission_user_init_files_action:testaction:1" question_ref="ocil:ssg-file_permission_user_init_files_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_home_directories_action:testaction:1" question_ref="ocil:ssg-file_permissions_home_directories_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_home_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_home_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1" question_ref="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_profile_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_profile_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_umask_interactive_users_action:testaction:1" question_ref="ocil:ssg-accounts_umask_interactive_users_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_auditd_enabled_action:testaction:1" question_ref="ocil:ssg-service_auditd_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_mac_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_mac_modification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_media_export_action:testaction:1" question_ref="ocil:ssg-audit_rules_media_export_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1" question_ref="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_group_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_group_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_gshadow_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_gshadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_opasswd_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_opasswd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_passwd_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_passwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_shadow_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-directory_access_var_log_audit_action:testaction:1" question_ref="ocil:ssg-directory_access_var_log_audit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-directory_permissions_var_log_audit_action:testaction:1" question_ref="ocil:ssg-directory_permissions_var_log_audit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_ownership_var_log_audit_action:testaction:1" question_ref="ocil:ssg-file_ownership_var_log_audit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_suid_privilege_function_action:testaction:1" question_ref="ocil:ssg-audit_rules_suid_privilege_function_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_enable_syscall_auditing_action:testaction:1" question_ref="ocil:ssg-audit_rules_enable_syscall_auditing_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_mount_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_mount_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_umount_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_umount_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_umount2_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_umount2_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_chcon_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_chcon_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_chacl_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_chacl_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_chmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_chmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_crontab_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_crontab_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_rm_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_rm_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_setfacl_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_setfacl_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_execution_ssh-agent_action:testaction:1" question_ref="ocil:ssg-audit_rules_execution_ssh-agent_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_file_deletion_events_action:testaction:1" question_ref="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_delete_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_finit_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_finit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_init_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_init_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_login_events_lastlog_action:testaction:1" question_ref="ocil:ssg-audit_rules_login_events_lastlog_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_login_events_tallylog_action:testaction:1" question_ref="ocil:ssg-audit_rules_login_events_tallylog_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_login_events_faillog_action:testaction:1" question_ref="ocil:ssg-audit_rules_login_events_faillog_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_chage_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_chage_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_chsh_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_chsh_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_gpasswd_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_gpasswd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_newgrp_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_newgrp_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_passwd_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_passwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_ssh_keysign_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_ssh_keysign_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_su_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_su_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_sudo_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_sudo_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_sudoedit_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_sudoedit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_chfn_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_chfn_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_insmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_insmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_kmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_kmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_modprobe_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_modprobe_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_passmass_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_passmass_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_rmmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_rmmod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_usermod_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_usermod_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_time_adjtimex_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_time_clock_settime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_time_settimeofday_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_time_stime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_stime_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_creat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_open_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_openat_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_openat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_configure_remote_server_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_configure_remote_server_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_disk_full_action_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_disk_full_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_encrypt_sent_records_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_network_failure_action_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_network_failure_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_disk_error_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_disk_error_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_disk_full_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_disk_full_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_num_logs_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_space_left_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_space_left_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-grub2_password_action:testaction:1" question_ref="ocil:ssg-grub2_password_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-grub2_uefi_password_action:testaction:1" question_ref="ocil:ssg-grub2_uefi_password_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_rsyslog_installed_action:testaction:1" question_ref="ocil:ssg-package_rsyslog_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_rsyslog_enabled_action:testaction:1" question_ref="ocil:ssg-service_rsyslog_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-ensure_rtc_utc_configuration_action:testaction:1" question_ref="ocil:ssg-ensure_rtc_utc_configuration_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-rsyslog_files_groupownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_groupownership_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-rsyslog_files_ownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_ownership_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-rsyslog_files_permissions_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_permissions_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-ensure_logrotate_activated_action:testaction:1" question_ref="ocil:ssg-ensure_logrotate_activated_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_syslogng_installed_action:testaction:1" question_ref="ocil:ssg-package_syslogng_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_syslogng_enabled_action:testaction:1" question_ref="ocil:ssg-service_syslogng_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-rsyslog_remote_loghost_action:testaction:1" question_ref="ocil:ssg-rsyslog_remote_loghost_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-network_sniffer_disabled_action:testaction:1" question_ref="ocil:ssg-network_sniffer_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_ip6tables_enabled_action:testaction:1" question_ref="ocil:ssg-service_ip6tables_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_iptables_enabled_action:testaction:1" question_ref="ocil:ssg-service_iptables_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_ip6tables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_ip6tables_default_rule_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_forward_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-kernel_module_rds_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_rds_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-kernel_module_tipc_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-wireless_disable_interfaces_action:testaction:1" question_ref="ocil:ssg-wireless_disable_interfaces_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-susefirewall2_ddos_protection_action:testaction:1" question_ref="ocil:ssg-susefirewall2_ddos_protection_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-susefirewall2_only_required_services_action:testaction:1" question_ref="ocil:ssg-susefirewall2_only_required_services_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_SuSEfirewall2_enabled_action:testaction:1" question_ref="ocil:ssg-service_SuSEfirewall2_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_systemmap_action:testaction:1" question_ref="ocil:ssg-file_permissions_systemmap_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_ungroupowned_action:testaction:1" question_ref="ocil:ssg-file_permissions_ungroupowned_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-no_files_unowned_by_user_action:testaction:1" question_ref="ocil:ssg-no_files_unowned_by_user_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_fs_protected_hardlinks_action:testaction:1" question_ref="ocil:ssg-sysctl_fs_protected_hardlinks_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_fs_protected_symlinks_action:testaction:1" question_ref="ocil:ssg-sysctl_fs_protected_symlinks_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_system_groupowned_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_system_groupowned_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_group_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_shadow_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_owner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_group_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_owner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_gshadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_owner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_passwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_owner_etc_shadow_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_etc_group_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_group_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_passwd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_etc_shadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_shadow_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_etc_security_opasswd_action:testaction:1" question_ref="ocil:ssg-file_etc_security_opasswd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_ownership_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_binary_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_ownership_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_library_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_binary_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_library_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_autofs_disabled_action:testaction:1" question_ref="ocil:ssg-service_autofs_disabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1" question_ref="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_kernel_kptr_restrict_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_kptr_restrict_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-file_permissions_var_log_messages_action:testaction:1" question_ref="ocil:ssg-file_permissions_var_log_messages_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-permissions_local_var_log_audit_action:testaction:1" question_ref="ocil:ssg-permissions_local_var_log_audit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-permissions_local_audit_binaries_action:testaction:1" question_ref="ocil:ssg-permissions_local_audit_binaries_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-run_chkstat_action:testaction:1" question_ref="ocil:ssg-run_chkstat_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-encrypt_partitions_action:testaction:1" question_ref="ocil:ssg-encrypt_partitions_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_home_action:testaction:1" question_ref="ocil:ssg-partition_for_home_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_srv_action:testaction:1" question_ref="ocil:ssg-partition_for_srv_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_tmp_action:testaction:1" question_ref="ocil:ssg-partition_for_tmp_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_var_action:testaction:1" question_ref="ocil:ssg-partition_for_var_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_var_log_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_var_log_audit_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_audit_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-partition_for_home_dirs_action:testaction:1" question_ref="ocil:ssg-partition_for_home_dirs_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-enable_dconf_user_profile_action:testaction:1" question_ref="ocil:ssg-enable_dconf_user_profile_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_use_text_backend_action:testaction:1" question_ref="ocil:ssg-dconf_use_text_backend_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1" question_ref="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_automount_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_screensaver_idle_delay_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_screensaver_idle_delay_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_screensaver_mode_blank_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_screensaver_mode_blank_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screen_locking_keybindings_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screen_locking_keybindings_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_enable_lock_screen_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_enable_lock_screen_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-installed_OS_is_FIPS_certified_action:testaction:1" question_ref="ocil:ssg-installed_OS_is_FIPS_certified_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-installed_OS_is_certified_action:testaction:1" question_ref="ocil:ssg-installed_OS_is_certified_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-configure_crypto_policy_action:testaction:1" question_ref="ocil:ssg-configure_crypto_policy_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-configure_user_data_backups_action:testaction:1" question_ref="ocil:ssg-configure_user_data_backups_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-enable_dracut_fips_module_action:testaction:1" question_ref="ocil:ssg-enable_dracut_fips_module_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-enable_fips_mode_action:testaction:1" question_ref="ocil:ssg-enable_fips_mode_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sysctl_crypto_fips_enabled_action:testaction:1" question_ref="ocil:ssg-sysctl_crypto_fips_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_build_database_action:testaction:1" question_ref="ocil:ssg-aide_build_database_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_periodic_cron_checking_action:testaction:1" question_ref="ocil:ssg-aide_periodic_cron_checking_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_scan_notification_action:testaction:1" question_ref="ocil:ssg-aide_scan_notification_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_verify_acls_action:testaction:1" question_ref="ocil:ssg-aide_verify_acls_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_verify_ext_attributes_action:testaction:1" question_ref="ocil:ssg-aide_verify_ext_attributes_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_aide_installed_action:testaction:1" question_ref="ocil:ssg-package_aide_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-aide_check_audit_tools_action:testaction:1" question_ref="ocil:ssg-aide_check_audit_tools_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-accounts_authorized_local_users_action:testaction:1" question_ref="ocil:ssg-accounts_authorized_local_users_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sudo_remove_no_authenticate_action:testaction:1" question_ref="ocil:ssg-sudo_remove_no_authenticate_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sudo_remove_nopasswd_action:testaction:1" question_ref="ocil:ssg-sudo_remove_nopasswd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sudo_require_authentication_action:testaction:1" question_ref="ocil:ssg-sudo_require_authentication_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-sudo_vdsm_nopasswd_action:testaction:1" question_ref="ocil:ssg-sudo_vdsm_nopasswd_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-clean_components_post_updating_action:testaction:1" question_ref="ocil:ssg-clean_components_post_updating_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1" question_ref="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-security_patches_up_to_date_action:testaction:1" question_ref="ocil:ssg-security_patches_up_to_date_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-blacklist_usb-storage_action:testaction:1" question_ref="ocil:ssg-blacklist_usb-storage_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-apparmor_configured_action:testaction:1" question_ref="ocil:ssg-apparmor_configured_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-service_apparmor_enabled_action:testaction:1" question_ref="ocil:ssg-service_apparmor_enabled_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
        <ns0:boolean_question_test_action id="ocil:ssg-package_pam_apparmor_installed_action:testaction:1" question_ref="ocil:ssg-package_pam_apparmor_installed_question:question:1">
          <ns0:when_true>
            <ns0:result>PASS</ns0:result>
          </ns0:when_true>
          <ns0:when_false>
            <ns0:result>FAIL</ns0:result>
          </ns0:when_false>
        </ns0:boolean_question_test_action>
      </ns0:test_actions>
      <ns0:questions>
        <ns0:boolean_question id="ocil:ssg-service_kdump_disabled_question:question:1">
          <ns0:question_text> To check that the kdump service is disabled in system boot configuration, run the following command: $ systemctl is-enabled kdump Output should indicate the kdump service has either not been installed, or has been disabled at all runlevels, as shown in the example below: $ systemctl is-enabled kdumpdisabled
Run the following command to verify kdump is not active (i.e. not running) through current runtime configuration: $ systemctl is-active kdump
If the service is not running the command will return the following output: inactive
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_cron_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the cron service: $ systemctl is-active cron If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-ftp_present_banner_question:question:1">
          <ns0:question_text>If FTP services are not installed, this is not applicable.

To verify this configuration, run the following command:

grep "banner_file" /etc/vsftpd.conf


The output should show the value of banner_file is set to /etc/issue, an example of which is shown below:

$ sudo grep "banner_file" /etc/vsftpd.conf

banner_file=/etc/issue
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-postfix_client_configure_mail_alias_question:question:1">
          <ns0:question_text>Find the list of alias maps used by the Postfix mail server:
$ sudo postconf alias_maps
Query the Postfix alias maps for an alias for the root user:
$ sudo postmap -q root hash:/etc/aliases
The output should return an alias.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_all_squash_exports_question:question:1">
          <ns0:question_text>To verify all squashing has been disabled, run the following command:
$ grep all_squash /etc/exports
			Is it the case that there is output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-chronyd_or_ntpd_set_maxpoll_question:question:1">
          <ns0:question_text>To verify that maxpoll has been set properly, perform the following:
$ sudo grep maxpoll /etc/ntp.conf /etc/chrony.conf
The output should return
maxpoll .
			Is it the case that it does not exist or maxpoll has not been set to the expected value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-ntpd_specify_remote_server_question:question:1">
          <ns0:question_text>To verify that a remote NTP service is configured for time synchronization,
open the following file:
/etc/ntp.conf
In the file, there should be a section similar to the following:
server ntpserver
			Is it the case that this is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_ntp_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the ntp service: $ systemctl is-active ntp If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_ntpd_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the ntpd service: $ systemctl is-active ntpd If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_timesyncd_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the systemd_timesyncd service: $ systemctl is-active systemd_timesyncd If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_host_based_files_question:question:1">
          <ns0:question_text>To verify that there are no shosts.equiv files
on the system, run the following command:
$ find / -name shosts.equiv
No output should be returned.
			Is it the case that these files exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_rsh_trust_files_question:question:1">
          <ns0:question_text>The existence of the file /etc/hosts.equiv or a file named
.rhosts inside a user home directory indicates the presence
of an Rsh trust relationship.
			Is it the case that these files exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_user_host_based_files_question:question:1">
          <ns0:question_text>To verify that there are no .shosts files
on the system, run the following command:
$ sudo find / -name '.shosts'
No output should be returned.
			Is it the case that these files exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_telnet-server_removed_question:question:1">
          <ns0:question_text>Run the following command to determine if the telnet-server package is installed:
$ rpm -q telnet-server
			Is it the case that the package is installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_sshd_private_key_question:question:1">
          <ns0:question_text> To check the permissions of /etc/ssh/*_key, run the command: $ ls -l /etc/ssh/*_key If properly configured, the output should indicate the following permissions: -rw-r-----
			Is it the case that  /etc/ssh/*_key has unix mode -rw-r-----?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_sshd_pub_key_question:question:1">
          <ns0:question_text> To check the permissions of /etc/ssh/*.pub, run the command: $ ls -l /etc/ssh/*.pub If properly configured, the output should indicate the following permissions: -rw-r--r--
			Is it the case that  /etc/ssh/*.pub has unix mode -rw-r--r--?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_sshd_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the sshd service: $ systemctl is-active sshd If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_openssh_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if the openssh package is installed: $ rpm -q openssh
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-disable_host_auth_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's HostbasedAuthentication option is set, run the following command:
$ sudo grep -i HostbasedAuthentication /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value no is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
          <ns0:question_text>To check which SSH protocol version is allowed, check version of openssh-server with following command:

$ rpm -qi openssh-server | grep Version

Versions equal to or higher than 7.4 only allow Protocol 2.
If version is lower than 7.4, run the following command to check configuration:
$ sudo grep Protocol /etc/ssh/sshd_config
If configured properly, output should be Protocol 2
			Is it the case that it is commented out or is not set correctly to Protocol 2?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_compression_question:question:1">
          <ns0:question_text>To check if compression is enabled or set correctly, run the
following command:
$ sudo grep Compression /etc/ssh/sshd_config
If configured properly, output should be no or delayed.
			Is it the case that it is commented out, or is not set to no or delayed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's PermitEmptyPasswords option is set, run the following command:
$ sudo grep -i PermitEmptyPasswords /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value no is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_gssapi_auth_question:question:1">
          <ns0:question_text>To check if GSSAPIAuthentication is disabled or set correctly, run the following
command:
$ sudo grep GSSAPIAuthentication /etc/ssh/sshd_config
If configured properly, output should be no
			Is it the case that it is commented out or is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_kerb_auth_question:question:1">
          <ns0:question_text>To check if KerberosAuthentication is disabled or set correctly, run the
following command:
$ sudo grep KerberosAuthentication /etc/ssh/sshd_config
If configured properly, output should be no
			Is it the case that it is commented out or is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_rhosts_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's IgnoreRhosts option is set, run the following command:
$ sudo grep -i IgnoreRhosts /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value yes is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_rhosts_rsa_question:question:1">
          <ns0:question_text>To check which SSH protocol version is allowed, check version of
openssh-server with following command:
$ rpm -qi openssh-server | grep Version
Versions equal to or higher than 7.4 have deprecated the RhostsRSAAuthentication option.
If version is lower than 7.4, run the following command to check configuration:
To determine how the SSH daemon's RhostsRSAAuthentication option is set, run the following command:
$ sudo grep -i RhostsRSAAuthentication /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value no is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_root_login_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's PermitRootLogin option is set, run the following command:
$ sudo grep -i PermitRootLogin /etc/ssh/sshd_config

If a line indicating no is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_disable_user_known_hosts_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's IgnoreUserKnownHosts option is set, run the following command:
$ sudo grep -i IgnoreUserKnownHosts /etc/ssh/sshd_config

If a line indicating yes is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
          <ns0:question_text>To ensure users are not able to present environment daemons, run the following command:
$ sudo grep PermitUserEnvironment /etc/ssh/sshd_config
If properly configured, output should be:
PermitUserEnvironment no
			Is it the case that PermitUserEnvironment is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_enable_strictmodes_question:question:1">
          <ns0:question_text>To check if StrictModes is enabled or set correctly, run the
following command:
$ sudo grep StrictModes /etc/ssh/sshd_config
If configured properly, output should be yes
			Is it the case that it is commented out or is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_enable_warning_banner_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's Banner option is set, run the following command:
$ sudo grep -i Banner /etc/ssh/sshd_config

If a line indicating /etc/issue is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_enable_x11_forwarding_question:question:1">
          <ns0:question_text>To determine how the SSH daemon's X11Forwarding option is set, run the following command:
$ sudo grep -i X11Forwarding /etc/ssh/sshd_config

If a line indicating yes is returned, then the required value is set.

			Is it the case that the required value is not set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_print_last_log_question:question:1">
          <ns0:question_text>To check if PrintLastLog is enabled or set correctly, run the
following command:
$ sudo grep PrintLastLog /etc/ssh/sshd_config
If configured properly, output should be yes
			Is it the case that it is commented out or is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_set_idle_timeout_question:question:1">
          <ns0:question_text>Run the following command to see what the timeout interval is:
$ sudo grep ClientAliveInterval /etc/ssh/sshd_config
If properly configured, the output should be:
ClientAliveInterval 
			Is it the case that it is commented out or not configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_set_keepalive_question:question:1">
          <ns0:question_text>To ensure the SSH idle timeout will occur when the ClientAliveInterval is set, run the following command:
$ sudo grep ClientAliveCountMax /etc/ssh/sshd_config
If properly configured, output should be:
ClientAliveCountMax 
			Is it the case that it is commented out or not configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_set_loglevel_info_question:question:1">
          <ns0:question_text>To check if LogLevel is enabled or set correctly, run the
following command:
$ sudo grep "^LogLevel" /etc/ssh/sshd_config
If configured properly, output should be LogLevel INFO
			Is it the case that it is commented out or is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_set_max_auth_tries_question:question:1">
          <ns0:question_text>To ensure the MaxAuthTries parameter is set, run the following command:
$ sudo grep MaxAuthTries /etc/ssh/sshd_config
If properly configured, output should be:
MaxAuthTries tries
			Is it the case that it is commented out or not configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
          <ns0:question_text>Only DoD-approved ciphers should be used. To verify that only DoD-approved
ciphers are in use, run the following command:
$ sudo grep Ciphers /etc/ssh/sshd_config
The output should contain only those ciphers which are DoD-approved.
			Is it the case that DoD-approved ciphers are not configured or the enabled ciphers are not DoD-approved?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_use_approved_macs_question:question:1">
          <ns0:question_text>Only FIPS-approved MACs should be used. To verify that only FIPS-approved
MACs are in use, run the following command:
$ sudo grep -i macs /etc/ssh/sshd_config
The output should contain only those MACs which are FIPS-approved. Any use of other
ciphers or algorithms will result in the module entering the non-FIPS mode of
operation.
			Is it the case that MACs option is commented out or not using FIPS-approved hash algorithms?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_use_priv_separation_question:question:1">
          <ns0:question_text>To check if UsePrivilegeSeparation is enabled or set correctly, run the
following command:
$ sudo grep UsePrivilegeSeparation /etc/ssh/sshd_config
If configured properly, output should be .
			Is it the case that it is commented out or is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sshd_set_loglevel_verbose_question:question:1">
          <ns0:question_text>To check if LogLevel is enabled or set correctly, run the
following command:
$ sudo grep "^LogLevel" /etc/ssh/sshd_config
If configured properly, output should be LogLevel VERBOSE
			Is it the case that it is commented out or is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sssd_memcache_timeout_question:question:1">
          <ns0:question_text>To verify that SSSD's in-memory cache expires after a day, run the following command:
$ sudo grep memcache_timeout /etc/sssd/sssd.conf
If configured properly, output should be memcache_timeout = .
			Is it the case that it does not exist or is not configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
          <ns0:question_text>To verify that SSSD expires offline credentials, run the following command:
$ sudo grep offline_credentials_expiration /etc/sssd/sssd.conf
If configured properly, output should be
offline_credentials_expiration = 1
			Is it the case that it does not exist or is not configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-banner_etc_issue_question:question:1">
          <ns0:question_text>To check if the system login banner is compliant,
run the following command:
$ cat /etc/issue
			Is it the case that it does not display the required banner?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-banner_etc_motd_question:question:1">
          <ns0:question_text>To check if the system login banner is compliant,
run the following command:
$ cat /etc/motd
			Is it the case that it does not display the required banner?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_banner_enabled_question:question:1">
          <ns0:question_text>To ensure a login warning banner is enabled, run the following:
$ grep banner-message-enable /etc/dconf/db/gdm.d/*
If properly configured, the output should be true.
To ensure a login warning banner is locked and cannot be changed by a user, run the following:
$ grep banner-message-enable /etc/dconf/db/gdm.d/locks/*
If properly configured, the output should be /org/gnome/login-screen/banner-message-enable.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_login_banner_text_question:question:1">
          <ns0:question_text>To ensure the login warning banner text is properly set, run the following:
$ grep banner-message-text /etc/dconf/db/gdm.d/*
If properly configured, the proper banner text will appear.
To ensure the login warning banner text is locked and cannot be changed by a user, run the following:
$ grep banner-message-text /etc/dconf/db/gdm.d/locks/*
If properly configured, the output should be /org/gnome/login-screen/banner-message-text.
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
          <ns0:question_text>To ensure a login warning banner is enabled, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_enable
Search for the banner_message_enable schema.
If properly configured, the default value should be true.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
          <ns0:question_text>To ensure the login warning banner text is properly set, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_text
If properly configured, the proper banner text will appear within this schema.
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gui_login_dod_acknowledgement_question:question:1">
          <ns0:question_text>Verify the SUSE operating system displays the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on via the local GUI. 

Note: If GNOME is not installed, this requirement is Not Applicable.

Check the configuration by running the following command:

# more /etc/gdm/Xsession

The beginning of the file must contain the following text immediately after #!/bin/sh:

if ! zenity --text-info \
--title "Consent" \
--filename=/etc/gdm/banner \
--no-markup \
--checkbox="Accept." 10 10; then
sleep 1;
exit 1;
fi

If the beginning of the file does not contain the above text immediately after the line (#!/bin/sh), this is a finding.
			Is it the case that the GNOME environment does not display the standard mandatory DoD notice and consent banner?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-banner_etc_gdm_banner_question:question:1">
          <ns0:question_text>To check if the system login banner is compliant,
run the following command:
$ cat /etc/gdm/banner
			Is it the case that it does not display the required banner?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-display_login_attempts_question:question:1">
          <ns0:question_text>To ensure that last logon/access notification is configured correctly, run
the following command:

$ grep pam_lastlog.so /etc/pam.d/login
The output should show output showfailed and must not contain silent.
			Is it the case that that is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-faildelay_question:question:1">
          <ns0:question_text>Verify the SUSE operating system enforces a delay of at least four seconds
between logon prompts following a failed logon attempt.

# grep pam_faildelay /etc/pam.d/common-auth*
auth required pam_faildelay.so delay=000000

If the value of delay is not set to 4000000, delay is commented out, delay is missing, or the pam_faildelay line is missing completely, this is a finding.
			Is it the case that that is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-pam_disable_automatic_configuration_question:question:1">
          <ns0:question_text>Check that soft links between PAM configuration files are removed with the following command:

# find /etc/pam.d/ -type l -iname "common-*"

If any results are returned, this is a finding.
			Is it the case that that is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
          <ns0:question_text>To verify the password reuse setting is compliant, run the following command:

$ grep remember /etc/pam.d/common-password
The output should show the following at the end of the line:
remember= use_authtok
			Is it the case that the value of remember is not set equal to or greater than the expected setting?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_passwords_pam_tally2_question:question:1">
          <ns0:question_text>Check that the systems locks a user account after three consecutive failed login attempts with the following command:

# grep pam_tally2.so /etc/pam.d/common-auth
auth required pam_tally2.so deny=3

# grep pam_tally2.so /etc/pam.d/common-account
account required pam_tally2.so deny=3

If the "deny" option in one of the files is greater than "3" or is missing, this is a finding.
			Is it the case that that is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_dcredit_question:question:1">
          <ns0:question_text>To check how many digits are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The dcredit parameter (as a negative number) will indicate how many digits are required.
The DoD requires at least one digit in a password.
This would appear as dcredit=-1.
			Is it the case that dcredit is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_difok_question:question:1">
          <ns0:question_text>To check how many characters must differ during a password change, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The difok parameter will indicate how many characters must differ.
The DoD requires four characters differ during a password change.
This would appear as difok=4.
			Is it the case that difok is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_lcredit_question:question:1">
          <ns0:question_text>To check how many lowercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The lcredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one lowercase character in a password.
This would appear as lcredit=-1.
			Is it the case that lcredit is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_maxrepeat_question:question:1">
          <ns0:question_text>To check the maximum value for consecutive repeating characters, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
Look for the value of the maxrepeat parameter. The DoD requirement is 3.
			Is it the case that maxrepeat is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_minclass_question:question:1">
          <ns0:question_text>To check how many categories of characters must be used in password during a password change,
run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The minclass parameter will indicate how many character classes must be used. If
the requirement was for the password to contain characters from three different categories,
then this would appear as minclass=3.
			Is it the case that minclass is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_minlen_question:question:1">
          <ns0:question_text>To check how many characters are required in a password, run the following command:
$ grep cracklib /etc/pam.d/system-auth
Your output should contain minlen=
			Is it the case that minlen is not found or not set to the required value (or higher)?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_ocredit_question:question:1">
          <ns0:question_text>To check how many special characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ocredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one special character in a password.
This would appear as ocredit=-1.
			Is it the case that ocredit is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_retry_question:question:1">
          <ns0:question_text>To check how many retry attempts are permitted on a per-session basis, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The retry parameter will indicate how many attempts are permitted.
The DoD required value is less than or equal to 3.
This would appear as retry=3, or a lower value.
			Is it the case that it is not the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-cracklib_accounts_password_pam_ucredit_question:question:1">
          <ns0:question_text>To check how many uppercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ucredit parameter (as a negative number) will indicate how many uppercase characters are required.
The DoD and FISMA require at least one uppercase character in a password.
This would appear as ucredit=-1.
			Is it the case that ucredit is not found or not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
          <ns0:question_text>Inspect /etc/login.defs and ensure the following line appears:
ENCRYPT_METHOD SHA512
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
          <ns0:question_text>
Inspect the contents of /etc/pam.d/common-password

and ensure that the pam_unix.so module includes the argument
sha512:

$ grep sha512 /etc/pam.d/common-password
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_password_hashing_min_rounds_logindefs_question:question:1">
          <ns0:question_text>Inspect /etc/login.defs and ensure the following settings are either not configured, or set at least to a value of 5000:
SHA_CRYPT_MIN_ROUNDS 5000
SHA_CRYPT_MAX_ROUNDS 5000
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_password_hashing_algorithm_commonauth_question:question:1">
          <ns0:question_text>Inspect the contents of /etc/pam.d/common-auth
and ensure that the pam_unix.so module includes the argument
sha512:
$ grep sha512 /etc/pam.d/common-auth
auth required pam_unix.so sha512 try_first_pass
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
          <ns0:question_text>
To ensure the system is configured to mask the Ctrl-Alt-Del sequence,
enter the following command:
$ sudo ln -sf /dev/null /etc/systemd/system/ctrl-alt-del.target
or
$ sudo systemctl mask ctrl-alt-del.target
			Is it the case that the system is configured to reboot when Ctrl-Alt-Del is pressed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-vlock_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if vlock is installed: $ rpm -q --whatprovides vlock
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-install_smartcard_packages_question:question:1">
          <ns0:question_text>To verify the operating system has the packages required for multifactor
authentication installed, run the following command:

# rpm -q pam_pkcs11 mozilla-nss mozilla-nss-tools pcsc-ccid pcsc-lite pcsc-tools opensc coolkey
			Is it the case that smartcard software is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-smartcard_auth_question:question:1">
          <ns0:question_text>Interview the SA to determine if all accounts not exempted by policy are
using CAC authentication. For DoD systems, the following systems and
accounts are exempt from using smart card (CAC) authentication:
SIPRNET systemsStandalone systemsApplication accountsTemporary employee accounts, such as students or interns, who cannot
easily receive a CAC or PIVOperational tactical locations that are not collocated with RAPIDS
workstations to issue CAC or ALTTest systems, such as those with an Interim Approval to Test (IATT) and
use a separate VPN, firewall, or security measure preventing access to
network and system components from outside the protection boundary
documented in the IATT.
			Is it the case that non-exempt accounts are not using CAC authentication?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-smartcard_configure_cert_checking_question:question:1">
          <ns0:question_text>To verify the operating system implements certificate status checking for PKI
authentication, run the following command:
$ sudo grep -i cert_policy /etc/pam_pkcs11/pam_pkcs11.conf
The output should return multiple lines similiar to the following:
cert_policy = ca, ocsp_on, signature;
cert_policy = ca, ocsp_on, signature;
cert_policy = ca, ocsp_on, signature;
			Is it the case that ocsp_on is not configured?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-smartcard_pam_enabled_question:question:1">
          <ns0:question_text>Remote access is access to DoD nonpublic information systems by an
authorized user (or an information system) communicating through an
external, non-organization-controlled network. Remote access methods
include, for example, dial-up, broadband, and wireless.

This requirement only applies to components where this is specific to the
function of the device or has the concept of an organizational user (e.g.,
VPN, proxy capability). This does not apply to authentication for the
purpose of configuring the device itself (management).

Check that the pam_pkcs11.so option is configured in the
etc/pam.d/common-auth file with the following command:

# grep pam_pkcs11.so /etc/pam.d/common-auth

auth sufficient pam_pkcs11.so

If pam_pkcs11.so is not set in etc/pam.d/common-auth this
is a finding.
			Is it the case that non-exempt accounts are not using CAC authentication?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-smartcard_configure_ca_question:question:1">
          <ns0:question_text>To verify the operating system implements certificate status checking for PKI
authentication, run the following command:
$ sudo grep -i cert_policy /etc/pam_pkcs11/pam_pkcs11.conf
The output should return multiple lines similiar to the following:
cert_policy = ca, ocsp_on, signature;
cert_policy = ca, ocsp_on, signature;
cert_policy = ca, ocsp_on, signature;
			Is it the case that ca is not configured?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_unique_id_question:question:1">
          <ns0:question_text>Run the following command to check for duplicate account names:
$ awk -F ":" 'list[$3]++{print $1, $3}' /etc/passwd
If there are no duplicate user IDs (UIDs), no line will be returned.
			Is it the case that a line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
          <ns0:question_text>To verify the INACTIVE setting, run the following command:
$ grep "INACTIVE" /etc/default/useradd
The output should indicate the INACTIVE configuration option is set
to an appropriate integer as shown in the example below:
$ grep "INACTIVE" /etc/default/useradd
INACTIVE=
			Is it the case that the value of INACTIVE is greater than the expected value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_temp_expire_date_question:question:1">
          <ns0:question_text>For every temporary and emergency account, run the following command
to obtain its account aging and expiration information:
$ sudo chage -l USER
Verify each of these accounts has an expiration date set as documented.
			Is it the case that any temporary or emergency accounts have no expiration date set or do not expire within a documented time frame?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_unique_name_question:question:1">
          <ns0:question_text>Run the following command to check for duplicate account names:
$ sudo pwck -qr
If there are no duplicate names, no line will be returned.
			Is it the case that a line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_use_centralized_automated_auth_question:question:1">
          <ns0:question_text>Verify that the system is integrated with a centralized authentication mechanism
such as as Active Directory, Kerberos, Directory Server, etc. that has
automated account mechanisms in place.
			Is it the case that the system is not using a centralized authentication mechanism, or it is not automated?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_minimum_age_shadow_question:question:1">
          <ns0:question_text>Check the minimum time period between password changes for each user account with the following command:

# sudo cat /etc/shadow | cut -d ':' -f1,4 | grep -v 1 | grep -v ":$"

smithj:1
			Is it the case that the second column is zero for any account?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_maximum_age_shadow_question:question:1">
          <ns0:question_text>Check the maximum time period between password changes for each user account with the following command:

# sudo awk -F':' '$5 &gt;  { print $1, $5 }' &lt; /etc/shadow

smithj 90
			Is it the case that any line appears?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-account_emergency_admin_question:question:1">
          <ns0:question_text>Check to see if an emergency administrator account password or account expires with the following command:

# sudo chage -l [Emergency_Administrator]

Password expires:never

If Password expires or Account expires is set to anything other than never, this is a finding.
			Is it the case that any emergency administrator account or account password has an expiration date set?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-policy_temp_passwords_immediate_change_question:question:1">
          <ns0:question_text>Verify that a policy exists that ensures when a user is created, it is
creating using a method that forces a user to change their password upon
their next login.

Configure the SUSE operating system to allow the use of a temporary
password for system logons with an immediate change to a permanent
password. 

Using one of the acceptable methods listed below, force a user to change
their password on their next logon by replacing "[UserName]" in the one of the
following commands:

# chage -d 0 [UserName]
# passwd -e [UserName]
			Is it the case that any temporary or emergency accounts have no expiration date set or do not expire within a documented time frame?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
          <ns0:question_text>To check the maximum password age, run the command:
$ grep PASS_MAX_DAYS /etc/login.defs
The DoD and FISMA requirement is 60.
A value of 180 days is sufficient for many environments.
			Is it the case that PASS_MAX_DAYS is not set equal to or greater than the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
          <ns0:question_text>To check the minimum password age, run the command:
$ grep PASS_MIN_DAYS /etc/login.defs
			Is it the case that it is not equal to or greater than the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
          <ns0:question_text>To check the minimum password length, run the command:
$ grep PASS_MIN_LEN /etc/login.defs
The DoD requirement is 15.
			Is it the case that it is not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
          <ns0:question_text>To check the password warning age, run the command:
$ grep PASS_WARN_AGE /etc/login.defs
The DoD requirement is 7.
			Is it the case that it is not set to the required value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_password_all_shadowed_question:question:1">
          <ns0:question_text>To check that no password hashes are stored in
/etc/passwd, run the following command:
awk '!/\S:x|\*/ {print}' /etc/passwd
If it produces any output, then a password hash is
stored in /etc/passwd.
			Is it the case that any stored hashes are found in /etc/passwd?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gid_passwd_group_same_question:question:1">
          <ns0:question_text>To ensure all GIDs referenced in /etc/passwd are defined in /etc/group,
run the following command:
$ sudo pwck -qr
There should be no output.
			Is it the case that GIFs referenced in /etc/passwd are returned as not defined in /etc/group?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_empty_passwords_question:question:1">
          <ns0:question_text>To verify that null passwords cannot be used, run the following command:

$ grep nullok /etc/pam.d/common-password and /etc/pam.d/common-auth

If this produces any output, it may be possible to log into accounts
with empty passwords. Remove any instances of the nullok option to
prevent logins with empty passwords.
			Is it the case that NULL passwords can be used?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_netrc_files_question:question:1">
          <ns0:question_text>To check the system for the existence of any .netrc files,
run the following command:
$ sudo find /home -xdev -name .netrc
			Is it the case that any .netrc files exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_password_all_shadowed_sha512_question:question:1">
          <ns0:question_text>Check that the interactive user account passwords are using a strong password hash with the following command:

# sudo cut -d: -f2 /etc/shadow

$6$kcOnRq/5$NUEYPuyL.wghQwWssXRcLRFiiru7f5JPV6GaJhNC2aK5F3PZpE/BCCtwrxRc/AInKMNX3CdMw11m9STiql12f/

Password hashes ! or * indicate inactive accounts not available for logon and are not evaluated.

If any interactive user password hash does not begin with $6, this is a finding.
			Is it the case that passwords hashed with an unauthorized algorithm are found in /etc/shadow?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
          <ns0:question_text>To list all password file entries for accounts with UID 0, run the
following command:
$ awk -F: '($3 == \"0\") {print}' /etc/passwd
This should print only one line, for the user root.

If there is a finding, change the UID of the failing (non-root) user. If
the account is associated with the system commands or applications the UID
should be changed to one greater than 0 but less than
1000. Otherwise assign a UID of greater than 1000 that
has not already been assigned.
			Is it the case that any account other than root has a UID of 0?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_direct_root_logins_question:question:1">
          <ns0:question_text>To ensure root may not directly login to the system over physical consoles,
run the following command:
cat /etc/securetty
If any output is returned, this is a finding.
			Is it the case that the /etc/securetty file is not empty?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_password_auth_for_systemaccounts_question:question:1">
          <ns0:question_text>To obtain a listing of all users and the contents of their shadow password
field, run the command:
$ sudo awk -F: '$1 !~ /^root$/ &amp;&amp; $2 !~ /^[!*]/ {print $1 ":" $2}' /etc/shadow
Identify the system accounts from this listing. These will primarily be the accounts
with UID numbers less than UID_MIN, other than root. Value of the UID_MIN
directive is set in /etc/login.defs configuration file. In the default
configuration, UID_MIN is set to 500.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-restrict_serial_port_logins_question:question:1">
          <ns0:question_text>To check for serial port entries which permit root login,
run the following command:
$ sudo grep ^ttyS/[0-9] /etc/securetty
If any output is returned, then root login over serial ports is permitted.
			Is it the case that root login over serial ports is permitted?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-securetty_root_login_console_only_question:question:1">
          <ns0:question_text>To check for virtual console entries which permit root login, run the
following command:
$ sudo grep ^vc/[0-9] /etc/securetty
If any output is returned, then root logins over virtual console devices is permitted.
			Is it the case that root login over virtual console devices is permitted?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_have_homedir_login_defs_question:question:1">
          <ns0:question_text>Check if the system is configured to create home directories for local interactive users with the following command:

$ sudo grep -i create_home /etc/login.defs

			Is it the case that the value of CREATE_HOME is not set to yes, is missing, or the line is commented out?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_logon_fail_delay_question:question:1">
          <ns0:question_text>Verify the FAIL_DELAY setting is configured correctly in the /etc/login.defs file by
running the following command:
$ sudo grep -i "FAIL_DELAY" /etc/login.defs
All output must show the value of FAIL_DELAY set as shown in the below:
$ sudo grep -i "FAIL_DELAY" /etc/login.defs
fail_delay 
			Is it the case that the above command returns no output, or FAIL_DELAY is configured less than the expected value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
          <ns0:question_text>Run the following command to ensure the maxlogins value is
configured for all users on the system:
# grep "maxlogins" /etc/security/limits.conf
You should receive output similar to the following:
*\t\thard\tmaxlogins\t
			Is it the case that maxlogins is not equal to or less than the expected value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_tmout_question:question:1">
          <ns0:question_text>Run the following command to ensure the TMOUT value is configured for all users
on the system:

$ sudo grep TMOUT /etc/profile.d/autologout.sh

The output should return the following:
TMOUT=

readonly TMOUT
export TMOUT


			Is it the case that value of TMOUT is not less than or equal to expected setting?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_user_dot_no_world_writable_programs_question:question:1">
          <ns0:question_text>To verify that local initialization files do not execute world-writable programs,
execute the following command:
$ sudo find /home -perm -002 -type f -exec ls -ld {} -name ".[^.]*"\;
There should be no output.
			Is it the case that files are executing world-writable programs?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_user_home_paths_only_question:question:1">
          <ns0:question_text>To verify that all interactive user initialization files executable search
path statements do not contain statements that will reference a working
directory other than the users home directory, run the following command:
$ sudo grep -r PATH /home/
Inspect the output for any PATH is references directories outside the home directory.
			Is it the case that paths contain more than local home directories?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_user_interactive_home_directory_defined_question:question:1">
          <ns0:question_text>To verify interactive users on the system have a home directory assigned,
run the following command:
$ sudo awk -F":" '{print $1 ":" $6}' /etc/passwd
Inspect the output and verify that all interactive users have a home directory
defined.
			Is it the case that users home directory is not defined?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_user_interactive_home_directory_exists_question:question:1">
          <ns0:question_text>To verify the assigned home directory of all interactive users on the system
exist, run the following command:
$ sudo pwck -r
The output should not return any interactive users.
			Is it the case that users home directory does not exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_users_home_files_groupownership_question:question:1">
          <ns0:question_text>To verify all files and directories in interactive user home directory are
group-owned by a group the user is a member of, run the
following command:
$ sudo ls -lLR /home/USER
			Is it the case that the group ownership is incorrect?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permission_user_init_files_question:question:1">
          <ns0:question_text>To verify that all user initialization files have a mode of 0740 or
less permissive, run the following command:
$ sudo find /home -type f -name '\.*' \( -perm -0002 -o -perm -0020 \)
There should be no output.
			Is it the case that they are not 0740 or more permissive?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_home_directories_question:question:1">
          <ns0:question_text>To verify the assigned home directory of all interactive user home directories
have a mode of 0750 or less permissive, run the following command:
$ sudo ls -l /home
Inspect the output for any directories with incorrect permissions.
			Is it the case that they are more permissive?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_home_dirs_question:question:1">
          <ns0:question_text>To ensure the user home directory is not group-writable or world-readable, run the following:
# ls -ld /home/USER
			Is it the case that the user home directory is group-writable or world-readable?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
          <ns0:question_text>To ensure write permissions are disabled for group and other
 for each element in root's path, run the following command:
# ls -ld DIR
			Is it the case that group or other write permissions exist?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
          <ns0:question_text>Verify the UMASK setting is configured correctly in the /etc/login.defs file by
running the following command:
# grep -i "UMASK" /etc/login.defs
All output must show the value of umask set as shown in the below:
# grep -i "UMASK" /etc/login.defs
umask 
			Is it the case that the above command returns no output, or if the umask is configured incorrectly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_umask_etc_profile_question:question:1">
          <ns0:question_text>Verify the umask setting is configured correctly in the /etc/profile file by
running the following command:
# grep "umask" /etc/profile
All output must show the value of umask set as shown in the below:
# grep "umask" /etc/profile
umask 
			Is it the case that the above command returns no output, or if the umask is configured incorrectly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_umask_interactive_users_question:question:1">
          <ns0:question_text>Verify the UMASK setting is not configured for interactive users,
run the following command:
$ sudo grep -ri "UMASK" /home
There should be no output.
			Is it the case that the above command returns no output, or if the umask is configured incorrectly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_auditd_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the auditd service: $ systemctl is-active auditd If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_mac_modification_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit changes to its SELinux
configuration files, run the following command:
$ sudo auditctl -l | grep "dir=/etc/selinux"
If the system is configured to watch for changes to its SELinux
configuration, a line should be returned (including
perm=wa indicating permissions that are watched).
			Is it the case that the system is not configured to audit attempts to change the MAC policy?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_media_export_question:question:1">
          <ns0:question_text>To verify that auditing is configured for all media exportation events, run the following command:
$ sudo auditctl -l | grep syscall | grep mount
			Is it the case that there is not output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit changes to its network configuration,
run the following command:
auditctl -l | egrep '(/etc/issue|/etc/issue.net|/etc/hosts|/etc/sysconfig/network)'
If the system is configured to watch for network configuration changes, a line should be returned for
each file specified (and perm=wa should be indicated for each).
			Is it the case that the system is not configured to audit changes of the network configuration?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
          <ns0:question_text>To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/etc/sudoers\|watch=/etc/sudoers.d\|-w /etc/sudoers\|-w /etc/sudoers.d"
			Is it the case that there is not output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:
auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow|/etc/security/opasswd)'
If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_group_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:

auditctl -l | egrep '(/etc/group)'

If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_gshadow_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:

auditctl -l | egrep '(/etc/gshadow)'

If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_opasswd_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:

auditctl -l | egrep '(/etc/security/opasswd)'

If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_passwd_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:

auditctl -l | egrep '(/etc/passwd)'

If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_shadow_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit account changes,
run the following command:

auditctl -l | egrep '(/etc/shadow)'

If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
			Is it the case that the system is not configured to audit account changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-directory_access_var_log_audit_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit accesses to
/var/log/audit directory, run the following command:
preserve$ sudo grep "dir=/var/log/audit" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-directory_permissions_var_log_audit_question:question:1">
          <ns0:question_text>Run the following command to check the mode of the system audit logs:
$ sudo ls -ld /var/log/audit
Audit log directories must be mode 0700 or less permissive.
			Is it the case that any are more permissive?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_ownership_var_log_audit_question:question:1">
          <ns0:question_text>
To properly set the owner of /var/log/audit, run the command:
$ sudo chown root /var/log/audit 

To properly set the owner of /var/log/audit/*, run the command:
$ sudo chown root /var/log/audit/* 
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_suid_privilege_function_question:question:1">
          <ns0:question_text>Find relevant setuid and setgid programs using the following command once for each local system partition, replacing "[PARTITION]" with each local system partition:

# sudo find [PARTITION] -xdev -type f \( -perm -4000 -o -perm -2000 \) 2&gt;/dev/null

Verify all of the programs found with the command above are listed in the audit file by running the following command for every program found, replacing "[FILE_PATH]" with each program to include the full path:

# grep [FILE_PATH] /etc/audit/audit.rules

-w [SETUID_FILE_PATH] -p wa -k privilege_function

All setuid and setgid programs on the system must have a corresponding audit rule, or there must be an audit rule for the subdirectory that contains the setuid/setgid file.
			Is it the case that audit records for all privileged operations performed through suid binaries are not generated?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_enable_syscall_auditing_question:question:1">
          <ns0:question_text>To check for the offending line, run the following command:
$ grep task,never /etc/audit/{rules.d,.}/audit.rules
There must not be any output, or else these lines must be removed from the matching files.
			Is it the case that syscall auditing is still disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
chmod system call, run the following command:
preserve$ sudo grep "chmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
chown system call, run the following command:
preserve$ sudo grep "chown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fchmod system call, run the following command:
preserve$ sudo grep "fchmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fchmodat system call, run the following command:
preserve$ sudo grep "fchmodat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fchown system call, run the following command:
preserve$ sudo grep "fchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fchownat system call, run the following command:
preserve$ sudo grep "fchownat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fremovexattr system call, run the following command:
preserve$ sudo grep "fremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
fsetxattr system call, run the following command:
preserve$ sudo grep "fsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
lchown system call, run the following command:
preserve$ sudo grep "lchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
lremovexattr system call, run the following command:
preserve$ sudo grep "lremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
lsetxattr system call, run the following command:
preserve$ sudo grep "lsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
removexattr system call, run the following command:
preserve$ sudo grep "removexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
setxattr system call, run the following command:
preserve$ sudo grep "setxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_mount_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
mount system call, run the following command:
preserve$ sudo grep "mount" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_umount_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
umount system call, run the following command:
preserve$ sudo grep "umount" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_dac_modification_umount2_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
umount2 system call, run the following command:
preserve$ sudo grep "umount2" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_chcon_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/chcon" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged-priv_change
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_chacl_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/chacl" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/chacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_chmod_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/chmod" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/chmod -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_crontab_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/crontab" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_rm_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/rm" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/rm -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_setfacl_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/setfacl" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_execution_ssh-agent_question:question:1">
          <ns0:question_text>To verify that execution of the command is being audited, run the following command:
$ sudo grep "path=/usr/bin/ssh-agent" /etc/audit/audit.rules /etc/audit/rules.d/*
The output should return something similar to:
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-ssh-agent
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
rmdir system call, run the following command:
preserve$ sudo grep "rmdir" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to the
unlink system call, run the following command:
preserve$ sudo grep "unlink" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to the
unlinkat system call, run the following command:
preserve$ sudo grep "unlinkat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to the
rename system call, run the following command:
preserve$ sudo grep "rename" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to the
renameat system call, run the following command:
preserve$ sudo grep "renameat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
init_module system call, run the following command:
preserve$ sudo grep "init_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to the
delete_module system call, run the following command:
preserve$ sudo grep "delete_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_delete_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
delete_module system call, run the following command:
preserve$ sudo grep "delete_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_finit_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
finit_module system call, run the following command:
preserve$ sudo grep "finit_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_init_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
init_module system call, run the following command:
preserve$ sudo grep "init_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_login_events_lastlog_question:question:1">
          <ns0:question_text>To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/var/log/lastlog\|-w /var/log/lastlog"
			Is it the case that there is not output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_login_events_tallylog_question:question:1">
          <ns0:question_text>To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/var/log/tallylog\|-w /var/log/tallylog"
			Is it the case that there is not output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_login_events_faillog_question:question:1">
          <ns0:question_text>To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/var/log/faillog\|-w /var/log/faillog"
			Is it the case that there is not output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command for each local partition PART to find relevant
setuid / setgid programs:
$ sudo find PART -xdev -type f -perm -4000 -o -type f -perm -2000 2&gt;/dev/null
Run the following command to verify entries in the audit rules for all programs
found with the previous command:
$ sudo grep path /etc/audit/audit.rules
It should be the case that all relevant setuid / setgid programs have a line
in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_chage_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep chage /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_chsh_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep chsh /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_gpasswd_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep gpasswd /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_newgrp_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep newgrp /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep pam_timestamp_check /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_passwd_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep passwd /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_ssh_keysign_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep ssh-keysign /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_su_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep su /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_sudo_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep sudo /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_sudoedit_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep sudoedit /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep unix_chkpwd /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_chfn_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep chfn /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_insmod_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep insmod /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_kmod_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep rmmod /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_modprobe_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep modprobe /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_passmass_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep passmass /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_rmmod_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep rmmod /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_privileged_commands_usermod_question:question:1">
          <ns0:question_text>To verify that auditing of privileged command use is configured, run the
following command:
$ sudo grep usermod /etc/audit/audit.rules /etc/audit/rules.d/*
It should return a relevant line in the audit rules.
			Is it the case that it is not the case?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
adjtimex system call, run the following command:
preserve$ sudo grep "adjtimex" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
clock_settime system call, run the following command:
preserve$ sudo grep "clock_settime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
settimeofday system call, run the following command:
preserve$ sudo grep "settimeofday" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_time_stime_question:question:1">
          <ns0:question_text>If the system is not configured to audit time changes, this is a finding.
If the system is 64-bit only, this is not applicable
ocil: |
To determine if the system is configured to audit calls to the
stime system call, run the following command:
preserve$ sudo grep "stime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit attempts to
alter time via the /etc/localtime file, run the following
command:
$ sudo auditctl -l | grep "watch=/etc/localtime"
If the system is configured to audit this activity, it will return a line.
			Is it the case that the system is not configured to audit time changes?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
          <ns0:question_text>To verify that the audit system collects unauthorized file accesses, run the following commands:
$ sudo grep EACCES /etc/audit/audit.rules
$ sudo grep EPERM /etc/audit/audit.rules
			Is it the case that 32-bit and 64-bit system calls to creat, open, openat, open_by_handle_at, truncate, and ftruncate are not audited during EACCES and EPERM?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_creat_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
creat system call, run the following command:
preserve$ sudo grep "creat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
ftruncate system call, run the following command:
preserve$ sudo grep "ftruncate" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
open system call, run the following command:
preserve$ sudo grep "open" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
open_by_handle_at system call, run the following command:
preserve$ sudo grep "open_by_handle_at" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_openat_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
openat system call, run the following command:
preserve$ sudo grep "openat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_question:question:1">
          <ns0:question_text>To determine if the system is configured to audit calls to the
truncate system call, run the following command:
preserve$ sudo grep "truncate" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_configure_remote_server_question:question:1">
          <ns0:question_text>To verify the audispd plugin off-loads audit records onto a different system or
media from the system being audited, run the following command:

$ sudo grep -i remote_server /etc/audisp/audisp-remote.conf

The output should return something similar to:
remote_server = 
			Is it the case that audispd is not sending logs to a remote system?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_disk_full_action_question:question:1">
          <ns0:question_text>Inspect /etc/audisp/audisp-remote.conf and locate the following line to
determine if the system is configured to either send to syslog, switch to single user mode,
or halt when the disk is full:
grep -i disk_full_action /etc/audisp/audisp-remote.conf
The output should return something similar to:
disk_full_action = single
Acceptable values also include syslog and
halt.
			Is it the case that the system is not configured to switch to single user mode for corrective action?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_encrypt_sent_records_question:question:1">
          <ns0:question_text>To verify the audispd plugin encrypts audit records off-loaded onto a different
system or media from the system being audited, run the following command:

$ sudo grep -i enable_krb5 /etc/audisp/audisp-remote.conf
The output should return the following:
enable_krb5 = yes
			Is it the case that audispd is not encrypting audit records when sent over the network?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_network_failure_action_question:question:1">
          <ns0:question_text>Inspect /etc/audisp/audisp-remote.conf and locate the following line to
determine if the system is configured to either send to syslog, switch to single user mode,
or halt when there is a network failure with audispd:
grep -i network_failure_action /etc/audisp/audisp-remote.conf
The output should return something similar to:
network_failure_action = single
Acceptable values also include syslog and
halt.
			Is it the case that the system is not configured to switch to single user mode for corrective action?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
          <ns0:question_text>To verify the audispd's syslog plugin is active, run the following command:

$ sudo grep active /etc/audisp/plugins.d/syslog.conf

If the plugin is active, the output will show yes.
			Is it the case that it is not activated?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_disk_error_action_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to either log to syslog,
switch to single-user mode, execute a script,
or halt when the disk errors:
disk_error_action single
			Is it the case that the system is not configured to switch to single-user mode for corrective action?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_disk_full_action_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to either log to syslog,
switch to single-user mode, execute a script,
or halt when the disk is out of space:
disk_full_action single
			Is it the case that the system is not configured to switch to single-user mode for corrective action?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to send email to an
account when it needs to notify an administrator:
action_mail_acct = root
			Is it the case that auditd is not configured to send emails per identified actions?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to either suspend, switch to single user mode,
or halt when disk space has run low:
admin_space_left_action single
			Is it the case that the system is not configured to switch to single user mode for corrective action?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine how much data the system will retain in each audit log file:
$ sudo grep max_log_file /etc/audit/auditd.conf
max_log_file = 6
			Is it the case that the system audit data threshold has not been properly configured?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to rotate logs when they reach their
maximum size:
$ sudo grep max_log_file_action /etc/audit/auditd.conf
max_log_file_action rotate
			Is it the case that the system has not been properly configured to rotate audit logs?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine how many logs the system is configured to retain after rotation:
$ sudo grep num_logs /etc/audit/auditd.conf
num_logs = 5
			Is it the case that the system log file retention has not been properly configured?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_space_left_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured correctly:
space_left = SIZE_in_MB

Where SIZE_in_MB is at least 25% of the capacity of partition storing /var/log/audit.
			Is it the case that the system is not configured a specfic size in MB to notify administrators of an issue?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
          <ns0:question_text>Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to email the administrator when
disk space is starting to run low:
$ sudo grep space_left_action /etc/audit/auditd.conf
space_left_action
Acceptable values are email, suspend, single, and halt.
			Is it the case that the system is not configured to send an email to the system administrator when disk space is starting to run low?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_question:question:1">
          <ns0:question_text>To verify whether audispd plugin off-loads audit records onto a different system or
media from the system being audited, run the following command:

$ sudo grep -i remote_server /etc/audisp/audisp-remote.conf

The output should return something similar to where REMOTE_SYSTEM
is an IP address or hostname:
remote_server = REMOTE_SYSTEM

Check the size of the partition that audit records are written to with the
following command and verify whether it is sufficiently large:

# df -h /var/log/audit/
/dev/sda2 24G 10.4G 13.6G 43% /var/log/audit
			Is it the case that audispd is not sending logs to a remote system and the local partition is insufficiently large?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-grub2_password_question:question:1">
          <ns0:question_text>To verify the boot loader superuser account has been set, run the following
command:

sudo grep -A1 "superusers\|password" /etc/grub.d/40_custom

The output should show the following:
set superusers="superusers-account"
export superusers
password_pbkdf2 superusers-account ${GRUB2_PASSWORD}
To verify the boot loader superuser account password has been set,
and the password encrypted, run the following command:

sudo cat /boot/grub2/grub.cfg
The output should be similar to:
password_pbkdf2 superuser grub.pbkdf2.sha512.10000.C4E08AC72FBFF7E837FD267BFAD7AEB3D42DDC
2C99F2A94DD5E2E75C2DC331B719FE55D9411745F82D1B6CFD9E927D61925F9BBDD1CFAA0080E0
916F7AB46E0D.1302284FCCC52CD73BA3671C6C12C26FF50BA873293B24EE2A96EE3B57963E6D7
0C83964B473EC8F93B07FE749AA6710269E904A9B08A6BBACB00A2D242AD828
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-grub2_uefi_password_question:question:1">
          <ns0:question_text>To verify the boot loader superuser account has been set, run the following
command:

sudo grep -A1 "superusers\|password" /etc/grub.d/40_custom

The output should show the following:
set superusers="superusers-account"
export superusers
password_pbkdf2 superusers-account ${GRUB2_PASSWORD}
To verify the boot loader superuser account password has been set,
and the password encrypted, run the following command:

sudo cat /boot/efi/EFI/sles/grub.cfg
The output should be similar to:
password_pbkdf2 superuser grub.pbkdf2.sha512.10000.C4E08AC72FBFF7E837FD267BFAD7AEB3D42DDC
2C99F2A94DD5E2E75C2DC331B719FE55D9411745F82D1B6CFD9E927D61925F9BBDD1CFAA0080E0
916F7AB46E0D.1302284FCCC52CD73BA3671C6C12C26FF50BA873293B24EE2A96EE3B57963E6D7
0C83964B473EC8F93B07FE749AA6710269E904A9B08A6BBACB00A2D242AD828
			Is it the case that it does not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_rsyslog_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if the rsyslog package is installed: $ rpm -q rsyslog
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_rsyslog_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the rsyslog service: $ systemctl is-active rsyslog If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-ensure_rtc_utc_configuration_question:question:1">
          <ns0:question_text>To verify that the system real-time clock is set to UTC, run the following command:
$ timedatectl status
The RTC in local TZ output should show no and the RTC time
should be the same as the Universal time.
If the RTC is set to the local time zone, use the following command to use UTC again:
$ sudo timedatectl set-local-rtc 0
			Is it the case that the system real-time clock is not configured to use UTC as its time base?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-rsyslog_files_groupownership_question:question:1">
          <ns0:question_text>The group-owner of all log files written by rsyslog should be .
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the group-owner of a given log file, run the following command:
$ ls -l LOGFILE
			Is it the case that the group-owner is not correct?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-rsyslog_files_ownership_question:question:1">
          <ns0:question_text>The owner of all log files written by rsyslog should be .
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the owner of a given log file, run the following command:
$ ls -l LOGFILE
			Is it the case that the owner is not correct?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-rsyslog_files_permissions_question:question:1">
          <ns0:question_text>The file permissions for all log files written by rsyslog should
be set to 600, or more restrictive. These log files are determined by the
second part of each Rule line in /etc/rsyslog.conf and typically
all appear in /var/log. To see the permissions of a given log
file, run the following command:
$ ls -l LOGFILE
The permissions should be 600, or more restrictive.
			Is it the case that the permissions are not correct?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-ensure_logrotate_activated_question:question:1">
          <ns0:question_text>To determine the status and frequency of logrotate, run the following command:
$ sudo grep logrotate /var/log/cron*
If logrotate is configured properly, output should include references to
/etc/cron.daily.
			Is it the case that logrotate is not configured to run daily?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_syslogng_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if the syslog-ng-core package is installed: $ rpm -q syslog-ng-core
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_syslogng_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the syslog-ng service: $ systemctl is-active syslog-ng If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-rsyslog_remote_loghost_question:question:1">
          <ns0:question_text>To ensure logs are sent to a remote host, examine the file
/etc/rsyslog.conf.
If using UDP, a line similar to the following should be present:
 *.* @loghost.example.com
If using TCP, a line similar to the following should be present:
 *.* @@loghost.example.com
If using RELP, a line similar to the following should be present:
 *.* :omrelp:loghost.example.com
			Is it the case that none of these are present?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-network_sniffer_disabled_question:question:1">
          <ns0:question_text>Promiscuous mode of an interface can be disabled with the following command:
$ sudo ip link set dev device_name promisc off
			Is it the case that any network device is in promiscuous mode?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_ip6tables_enabled_question:question:1">
          <ns0:question_text>If IPv6 is disabled, this is not applicable.


Run the following command to determine the current status of the
ip6tables service:
$ systemctl is-active ip6tables
If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_iptables_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the iptables service: $ systemctl is-active iptables If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_ip6tables_default_rule_question:question:1">
          <ns0:question_text>If IPv6 is disabled, this is not applicable.

Inspect the file /etc/sysconfig/ip6tables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/ip6tables
			Is it the case that the default policy for the INPUT chain is not set to DROP?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_iptables_default_rule_question:question:1">
          <ns0:question_text>Inspect the file /etc/sysconfig/iptables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/iptables
			Is it the case that the default policy for the INPUT chain is not set to DROP?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
          <ns0:question_text>Run the following command to ensure the default FORWARD policy is DROP:
grep ":FORWARD" /etc/sysconfig/iptables
The output should be similar to the following:
$ sudo grep ":FORWARD" /etc/sysconfig/iptables
:FORWARD DROP [0:0
			Is it the case that the default policy for the FORWARD chain is not set to DROP?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
          <ns0:question_text>The status of the net.ipv6.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
$ sysctl net.ipv6.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv6.conf.all.accept_source_route /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
          <ns0:question_text>The status of the net.ipv6.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
$ sysctl net.ipv6.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv6.conf.default.accept_redirects /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
          <ns0:question_text>If the system uses IPv6, this is not applicable.

If the system is configured to disable the
ipv6 kernel module, it will contain a line
of the form:
options ipv6 disable=1
Such lines may be inside any file in /etc/modprobe.d or the
deprecated/etc/modprobe.conf.  This permits insertion of the IPv6
kernel module (which other parts of the system expect to be present), but
otherwise keeps it inactive.  Run the following command to search for such
lines in all files in /etc/modprobe.d and the deprecated
/etc/modprobe.conf:
preserve$ grep -r ipv6 /etc/modprobe.conf /etc/modprobe.d
			Is it the case that the ipv6 kernel module is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.all.accept_redirects kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.all.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.all.accept_redirects /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.all.accept_source_route /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.default.accept_redirects /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.default.accept_source_route kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.default.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.default.accept_source_route /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
          <ns0:question_text>The status of the net.ipv4.icmp_echo_ignore_broadcasts kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.icmp_echo_ignore_broadcasts
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.icmp_echo_ignore_broadcasts /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
          <ns0:question_text>The status of the net.ipv4.tcp_syncookies kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.tcp_syncookies
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.tcp_syncookies /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.all.send_redirects kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.all.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.all.send_redirects /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
          <ns0:question_text>The status of the net.ipv4.conf.default.send_redirects kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.conf.default.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.conf.default.send_redirects /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
          <ns0:question_text>The status of the net.ipv4.ip_forward kernel parameter can be queried
by running the following command:
$ sysctl net.ipv4.ip_forward
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r net.ipv4.ip_forward /etc/sysctl.conf /etc/sysctl.d
The ability to forward packets is only appropriate for routers.
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-kernel_module_rds_disabled_question:question:1">
          <ns0:question_text>
If the system is configured to prevent the loading of the rds kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as /bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d and the deprecated /etc/modprobe.conf:
$ grep -r rds /etc/modprobe.conf /etc/modprobe.d
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
          <ns0:question_text>
If the system is configured to prevent the loading of the tipc kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as /bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d and the deprecated /etc/modprobe.conf:
$ grep -r tipc /etc/modprobe.conf /etc/modprobe.d
			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-wireless_disable_interfaces_question:question:1">
          <ns0:question_text>Verify that there are no wireless interfaces configured on the system
with the following command:

# wicked show all
lo up
link: #1, state up
type: loopback
config: compat:suse:/etc/sysconfig/network/ifcfg-lo
leases: ipv4 static granted
leases: ipv6 static granted
addr: ipv4 127.0.0.1/8 [static]
addr: ipv6 ::1/128 [static]

wlan0 up
link: #3, state up, mtu 1500
type: wireless, hwaddr 06:00:00:00:00:02
config: wicked:xml:/etc/wicked/ifconfig/wlan0.xml
leases: ipv4 dhcp granted
addr: ipv4 10.0.0.101/16 [dhcp]
route: ipv4 default via 10.0.0.1 proto dhcp
The output should not contain any interfaces of type wireless in state up.

If a wireless interface is configured it must be documented and approved by the local Authorizing Official.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-susefirewall2_ddos_protection_question:question:1">
          <ns0:question_text>Run the following command to determine if the SuSEfirewall2 package is installed:
$ rpm -q SuSEfirewall2

Run the following command to determine the current status of the
SuSEfirewall2 service:
$ systemctl is-active SuSEfirewall2
If the service is running, it should return the following: active

Run the following command:

# grep -i fw_services_accept_ext /etc/sysconfig/SuSEfirewall2
FW_SERVICES_ACCEPT_EXT="0/0,tcp,22,,hitcount=3,blockseconds=60,recentname=ssh"

If the "FW_SERVICES_ACCEPT_EXT" rule does not contain both the hitcount and blockseconds parameters, this is a finding.
			Is it the case that the DoS protection is not active?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-susefirewall2_only_required_services_question:question:1">
          <ns0:question_text>Check the firewall configuration for any unnecessary or prohibited
functions, ports, protocols, and/or services by running the following command:

# grep ^FW_ /etc/sysconfig/SuSEfirewall2

Ask the System Administrator for the site or program PPSM Component Local
Services Assessment (Component Local Services Assessment (CLSA). Verify the
services allowed by the firewall match the PPSM CLSA.

If there are any additional ports, protocols, or services that are not
included in the PPSM CLSA, this is a findin.

If there are any ports, protocols, or services that are prohibited by the
PPSM CAL, this is a finding.
			Is it the case that unauthorized network services can be accessed from the network?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_SuSEfirewall2_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the SuSEfirewall2 service: $ systemctl is-active SuSEfirewall2 If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
          <ns0:question_text>To find world-writable directories that lack the sticky bit, run the following command:
$ sudo find / -xdev -type d -perm 002 ! -perm 1000
			Is it the case that any world-writable directories are missing the sticky bit?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_systemmap_question:question:1">
          <ns0:question_text>
To check the permissions of /boot/Sysem.map-*, run the command:
$ ls -l /boot/Sysem.map-*
If properly configured, the output should indicate the following permissions:
-rw-------
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
          <ns0:question_text>To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
			Is it the case that there is output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
          <ns0:question_text>To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
			Is it the case that only authorized files appear in the output of the find command?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
          <ns0:question_text>To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
			Is it the case that there is output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_ungroupowned_question:question:1">
          <ns0:question_text>The following command will discover and print any
files on local partitions which do not belong to a valid group.
$ sudo find / -xdev -fstype local -nogroup

Either remove all files and directories from the system that do not have a valid group,
or assign a valid group with the chgrp command:
$ sudo chgrp group file
			Is it the case that there is output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-no_files_unowned_by_user_question:question:1">
          <ns0:question_text>The following command will discover and print any
files on local partitions which do not belong to a valid user.
$ sudo find / -xdev -fstype local -nouser

Either remove all files and directories from the system that do not have a
valid user, or assign a valid user to all unowned files and directories on
the system with the chown command:
$ sudo chown user file
			Is it the case that files exist that are not owned by a valid user?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_fs_protected_hardlinks_question:question:1">
          <ns0:question_text>The status of the fs.protected_hardlinks kernel parameter can be queried
by running the following command:
$ sysctl fs.protected_hardlinks
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r fs.protected_hardlinks /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_fs_protected_symlinks_question:question:1">
          <ns0:question_text>The status of the fs.protected_symlinks kernel parameter can be queried
by running the following command:
$ sysctl fs.protected_symlinks
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r fs.protected_symlinks /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dir_perms_world_writable_system_groupowned_question:question:1">
          <ns0:question_text>The following command will discover and print world-writable directories that
are not owned by a system account, given the assumption that only system
groups have a uid lower than 1000.  Run it once for each local partition PART:
$ sudo find PART -xdev -type d -perm -0002 -gid +999 -print
			Is it the case that there is output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_groupowner_etc_group_question:question:1">
          <ns0:question_text> To check the group ownership of /etc/group, run the command: $ ls -lL /etc/group If properly configured, the output should indicate the following group-owner. root
			Is it the case that  /etc/group has group owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
          <ns0:question_text> To check the group ownership of /etc/gshadow, run the command: $ ls -lL /etc/gshadow If properly configured, the output should indicate the following group-owner. root
			Is it the case that  /etc/gshadow has group owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
          <ns0:question_text> To check the group ownership of /etc/passwd, run the command: $ ls -lL /etc/passwd If properly configured, the output should indicate the following group-owner. root
			Is it the case that  /etc/passwd has group owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_groupowner_etc_shadow_question:question:1">
          <ns0:question_text> To check the group ownership of /etc/shadow, run the command: $ ls -lL /etc/shadow If properly configured, the output should indicate the following group-owner. root
			Is it the case that  /etc/shadow has group owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_owner_etc_group_question:question:1">
          <ns0:question_text> To check the ownership of /etc/group, run the command: $ ls -lL /etc/group If properly configured, the output should indicate the following owner: root
			Is it the case that  /etc/group has owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_owner_etc_gshadow_question:question:1">
          <ns0:question_text> To check the ownership of /etc/gshadow, run the command: $ ls -lL /etc/gshadow If properly configured, the output should indicate the following owner: root
			Is it the case that  /etc/gshadow has owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_owner_etc_passwd_question:question:1">
          <ns0:question_text> To check the ownership of /etc/passwd, run the command: $ ls -lL /etc/passwd If properly configured, the output should indicate the following owner: root
			Is it the case that  /etc/passwd has owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_owner_etc_shadow_question:question:1">
          <ns0:question_text> To check the ownership of /etc/shadow, run the command: $ ls -lL /etc/shadow If properly configured, the output should indicate the following owner: root
			Is it the case that  /etc/shadow has owner root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_etc_group_question:question:1">
          <ns0:question_text>
To check the permissions of /etc/passwd, run the command:
$ ls -l /etc/passwd
If properly configured, the output should indicate the following permissions:
-rw-r--r--
			Is it the case that  /etc/group has unix mode -rw-r--r--?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
          <ns0:question_text>
To check the permissions of /etc/gshadow, run the command:
$ ls -l /etc/gshadow
If properly configured, the output should indicate the following permissions:
----------
			Is it the case that  /etc/gshadow has unix mode ----------?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_etc_passwd_question:question:1">
          <ns0:question_text>
To check the permissions of /etc/passwd, run the command:
$ ls -l /etc/passwd
If properly configured, the output should indicate the following permissions:
-rw-r--r--
			Is it the case that  /etc/passwd has unix mode -rw-r--r--?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_etc_shadow_question:question:1">
          <ns0:question_text>
To check the permissions of /etc/shadow, run the command:
$ ls -l /etc/shadow
If properly configured, the output should indicate the following permissions:
-rw-r-----
			Is it the case that  /etc/shadow has unix mode ----------?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_etc_security_opasswd_question:question:1">
          <ns0:question_text> To check the ownership of /etc/security/opasswd, run the command: $ ls -lL /etc/security/opasswd If properly configured, the output should indicate the following owner: root
To check the group ownership of /etc/security/opasswd, run the command: $ ls -lL /etc/security/opasswd If properly configured, the output should indicate the following group-owner. root
To check the permissions of /etc/security/opasswd, run the command: $ ls -l /etc/security/opasswd If properly configured, the output should indicate the following permissions: 0600
			Is it the case that  /etc/security/opasswd has owner root and /etc/security/opasswd has group owner root and /etc/security/opasswd has unix mode 0600?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_ownership_binary_dirs_question:question:1">
          <ns0:question_text>System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are not owned by root,
run the following command for each directory DIR which contains system executables:
$ sudo find DIR/ \! -user root
			Is it the case that any system executables are found to not be owned by root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_ownership_library_dirs_question:question:1">
          <ns0:question_text>Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64
For each of these directories, run the following command to find files not
owned by root:
$ sudo find -L $DIR ! -user root -exec chown root {} \;
			Is it the case that any of these files are not owned by root?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_binary_dirs_question:question:1">
          <ns0:question_text>System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are group-writable or world-writable,
run the following command for each directory DIR which contains system executables:
$ sudo find -L DIR -perm /022 -type f
			Is it the case that any system executables are found to be group or world writable?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_library_dirs_question:question:1">
          <ns0:question_text>Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64

To find shared libraries that are group-writable or world-writable,
run the following command for each directory DIR which contains shared libraries:
$ sudo find -L DIR -perm /022 -type f
			Is it the case that any of these files are group-writable or world-writable?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_autofs_disabled_question:question:1">
          <ns0:question_text> To check that the autofs service is disabled in system boot configuration, run the following command: $ systemctl is-enabled autofs Output should indicate the autofs service has either not been installed, or has been disabled at all runlevels, as shown in the example below: $ systemctl is-enabled autofsdisabled
Run the following command to verify autofs is not active (i.e. not running) through current runtime configuration: $ systemctl is-active autofs
If the service is not running the command will return the following output: inactive
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
          <ns0:question_text>The status of the fs.suid_dumpable kernel parameter can be queried
by running the following command:
$ sysctl fs.suid_dumpable
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r fs.suid_dumpable /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_kernel_kptr_restrict_question:question:1">
          <ns0:question_text>The status of the kernel.kptr_restrict kernel parameter can be queried
by running the following command:
$ sysctl kernel.kptr_restrict
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r kernel.kptr_restrict /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
          <ns0:question_text>The status of the kernel.randomize_va_space kernel parameter can be queried
by running the following command:
$ sysctl kernel.randomize_va_space
The output of the command should indicate a value of 2.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly. This has to be checked
in all files in the /etc/sysctl.d directory and the deprecated
/etc/sysctl.conf. You can verify this by running the following command:
$ grep -r kernel.randomize_va_space /etc/sysctl.conf /etc/sysctl.d

			Is it the case that the correct value is not returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-file_permissions_var_log_messages_question:question:1">
          <ns0:question_text>
To check the permissions of /var/log/messages, run the command:
$ ls -l /var/log/messages
If properly configured, the output should indicate the following permissions:
-rw-r-----

Check that permissions.local file contains the correct permissions rules with the following command:

# grep -i messages /etc/permissions.local

/var/log/messages root:root 640

If the command does not return any or different output, this is a finding.

Run the following command to correct the permissions after adding the missing entry:

# sudo chkstat --set --system
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-permissions_local_var_log_audit_question:question:1">
          <ns0:question_text>Check that permissions.local file contains the correct permissions rules with the following command:

# grep -i audit /etc/permissions.local

/var/log/audit/ root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640

If the command does not return all the above lines, the missing ones need to be added.

Run the following command to correct the permissions after adding missing entries:

# sudo chkstat --set --system
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-permissions_local_audit_binaries_question:question:1">
          <ns0:question_text>Check that permissions.local file contains the correct permissions rules with the following command:

grep "^/usr/sbin/au" /etc/permissions.local

/usr/sbin/audispd root:root 0750
/usr/sbin/auditctl root:root 0750
/usr/sbin/auditd root:root 0750
/usr/sbin/ausearch root:root 0755
/usr/sbin/aureport root:root 0755
/usr/sbin/autrace root:root 0750
/usr/sbin/augenrules root:root 0750


If the command does not return all the above lines, the missing ones need to be added.

Run the following command to correct the permissions after adding missing entries:

# sudo chkstat --set --system
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-run_chkstat_question:question:1">
          <ns0:question_text>Check that all of the audit information files and folders have the correct
permissions with the following command:
# sudo chkstat --warn --system

If you get any warnings, set the correct permissions with the following command:

# sudo chkstat --set --system
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-encrypt_partitions_question:question:1">
          <ns0:question_text>Check the system partitions to determine if they are encrypted with the following command:
blkid

Output will be similar to:
/dev/sda1: UUID=" ab12c3de-4f56-789a-8f33-3850cc8ce3a2
" TYPE="crypto_LUKS"
/dev/sda2: UUID=" bc98d7ef-6g54-321h-1d24-9870de2ge1a2
" TYPE="crypto_LUKS"

Pseudo-file systems, such as /proc, /sys, and tmpfs, are not required to use disk encryption and are not a finding.
			Is it the case that partitions do not have a type of crypto_LUKS?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_home_question:question:1">
          <ns0:question_text>Run the following command to determine if /home
is on its own partition or logical volume:
$ mount | grep "on /home"
If /home has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_srv_question:question:1">
          <ns0:question_text>Run the following command to determine if /srv
is on its own partition or logical volume:
$ mount | grep "on /srv"
If /srv has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_tmp_question:question:1">
          <ns0:question_text>Run the following command to determine if /tmp
is on its own partition or logical volume:
$ mount | grep "on /tmp"
If /tmp has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_var_question:question:1">
          <ns0:question_text>Run the following command to determine if /var
is on its own partition or logical volume:
$ mount | grep "on /var"
If /var has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_var_log_question:question:1">
          <ns0:question_text>Run the following command to determine if /var/log
is on its own partition or logical volume:
$ mount | grep "on /var/log"
If /var/log has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_var_log_audit_question:question:1">
          <ns0:question_text>Run the following command to determine if /var/log/audit
is on its own partition or logical volume:
$ mount | grep "on /var/log/audit"
If /var/log/audit has its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-partition_for_home_dirs_question:question:1">
          <ns0:question_text>Assuming that user home directories are under /home,
run the following command to determine if they use their own partition or
logical volume:
$ mount | grep "on /home"
If /home has
its own partition or volume group, a line will be returned.

			Is it the case that no line is returned?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-enable_dconf_user_profile_question:question:1">
          <ns0:question_text>To verify that the DConf User profile is configured correctly, run the following
command:

$ cat /etc/dconf/profile/user
The output should show the following:
user-db:user
system-db:gdm
			Is it the case that DConf User profile does not exist or is not configured correctly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_use_text_backend_question:question:1">
          <ns0:question_text>To verify that the DConf uses text files as data backend,
put the line
service-db:keyfile/user
at the top of the
file /etc/dconf/profile/user
			Is it the case that DConf uses the binary database as data backend?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
          <ns0:question_text>To ensure the user list is disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_user_list
The output should be true.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
          <ns0:question_text>To ensure disable and restart on the login screen are disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_restart_buttons
The output should be true.
			Is it the case that disable-restart-buttons has not been configured or is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
          <ns0:question_text>To verify that automatic logins are disabled, run the following command:
$ grep -Pzoi "^\[daemon]\\nautomaticlogin.*" /etc/gdm/custom.conf
The output should show the following:
[daemon]
AutomaticLoginEnable=false
			Is it the case that GDM allows users to automatically login?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
          <ns0:question_text>These settings can be verified by running the following:
$ gconftool-2 -g /apps/nautilus/preferences/media_automount
The output should return false.
$ gconftool-2 -g /apps/nautilus/preferences/media_autorun_never
The output should return true.
			Is it the case that GNOME automounting is not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
          <ns0:question_text>These settings can be verified by running the following:
$ gconftool-2 -g /desktop/gnome/thumbnailers/disable_all
The output should return true.
			Is it the case that GNOME thumbnailers are not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
          <ns0:question_text>To ensure that WIFI connections cannot be created, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-wifi-create
The output should return true.
			Is it the case that WIFI connections can be created through GNOME?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
          <ns0:question_text>To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-disconnected-notifications
The output should return true.
			Is it the case that wireless disconnecting network notification is enabled and not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
          <ns0:question_text>To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-connected-notifications
The output should return true.
			Is it the case that wireless connecting network notification is enabled and not disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_screensaver_idle_delay_question:question:1">
          <ns0:question_text>To check the current idle time-out value, run the following command:
$ gsettings get org.gnome.desktop.session idle-delay
If properly configured, the output should be 'uint32 '.

If you want to ensure that users cannot change the screensaver inactivity timeout setting, run the following:

$ grep idle-delay /etc/dconf/db/local.d/locks/*
If properly configured, the output should be /org/gnome/desktop/session/idle-delay
			Is it the case that idle-delay is not equal to or less than the expected value?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_screensaver_mode_blank_question:question:1">
          <ns0:question_text>To ensure the screensaver is configured to be blank, run the following command:
$ gsettings get org.gnome.desktop.screensaver picture-uri
If properly configured, the output should be ''.

To ensure that users cannot set the screensaver background, run the following:
$ grep picture-uri /etc/dconf/db/local.d/locks/*
If properly configured, the output should be /org/gnome/desktop/screensaver/picture-uri
			Is it the case that it is not set or configured properly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screen_locking_keybindings_question:question:1">
          <ns0:question_text>To check the screensaver locking keybindings, run the following command:
$ gconftool-2 -g /apps/gnome_settings_daemon/keybindings/screensaver
If properly configured, the output should be &lt;Control&gt;&lt;Alt&gt;l.
			Is it the case that GNOME screensaver locking keybindings are configured and cannot be changed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
          <ns0:question_text>To check the screensaver mandatory use status, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/idle_activation_enabled
If properly configured, the output should be true.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
          <ns0:question_text>To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/idle_delay
If properly configured, the output should be .
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
          <ns0:question_text>To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/lock_enabled
If properly configured, the output should be true.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
          <ns0:question_text>To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_action
If properly configured, the output should be forced-logout.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
          <ns0:question_text>To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_time
If properly configured, the output should be .
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
          <ns0:question_text>To ensure the screensaver is configured to be blank, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/mode
If properly configured, the output should be blank-only
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_enable_lock_screen_question:question:1">
          <ns0:question_text>To check the status of the screen lock, run the following command:
$ gsettings get org.gnome.desktop.lockdown disable-lock-screen
If properly configured, the output should be false.
			Is it the case that lock screen is disabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
          <ns0:question_text>To ensure the system is configured to ignore the Ctrl-Alt-Del sequence,
run the following command:
$ gsettings get org.gnome.settings-daemon.plugins.media-keys logout
If properly configured, the output should be ''.
To ensure that users cannot enable the Ctrl-Alt-Del sequence, run the following:
$ grep logout /etc/dconf/db/local.d/locks/*
If properly configured, the output should be
/org/gnome/settings-daemon/plugins/media-keys/logout
			Is it the case that GNOME3 is configured to reboot when Ctrl-Alt-Del is pressed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
          <ns0:question_text>To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_temperature
If properly configured, the output should be false.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
          <ns0:question_text>To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_weather
If properly configured, the output should be false.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
          <ns0:question_text>To ensure the system is configured to ignore the Ctrl-Alt-Del sequence,
run the following command:
$ gconftool-2 -g /apps/gnome_settings_daemon/keybindings/power
The output should return nothing.
			Is it the case that GNOME is configured to reboot when Ctrl-Alt-Del is pressed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-installed_OS_is_FIPS_certified_question:question:1">
          <ns0:question_text>To verify that the installed operating system is supported or certified, run
the following command:

$ grep -i "suse" /etc/os-release

The output should contain something similar to:
SUSE Linux Enterprise 12
			Is it the case that the installed operating system is not FIPS 140-2 certified?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-installed_OS_is_certified_question:question:1">
          <ns0:question_text>To verify that the installed operating system is supported or certified, run
the following command:
$ grep -i "suse linux enterprise" /etc/os-release
The output should contain something similar to:
SUSE Linux Enterprise 12
			Is it the case that the installed operating system is not supported or certified?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-configure_crypto_policy_question:question:1">
          <ns0:question_text>To verify that cryptography policy has been configured correctly, run the
following command:
$ update-crypto-policies --show
The output should return .
			Is it the case that cryptographic policy is not configured or is configured incorrectly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-configure_user_data_backups_question:question:1">
          <ns0:question_text>Verify that the system backups user data.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-enable_dracut_fips_module_question:question:1">
          <ns0:question_text>To verify that the Dracut FIPS module is enabled, run the following command:
grep "add_dracutmodules" /etc/dracut.conf.d/40-fips.conf
The output should look like this:
add_dracutmodules+=" fips "
			Is it the case that the Dracut FIPS module is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-enable_fips_mode_question:question:1">
          <ns0:question_text>
To verify that FIPS is enabled properly, run the following command:
# cat /proc/sys/crypto/fips_enabled
The output should be 1.
			Is it the case that FIPS mode is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sysctl_crypto_fips_enabled_question:question:1">
          <ns0:question_text>To verify that kernel parameter 'crypto.fips_enabled' is set properly, run the following command:
sysctl crypto.fips_enabled
The output should contain the following:
crypto.fips_enabled =  1
			Is it the case that crypto.fips_enabled is not 1?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_build_database_question:question:1">
          <ns0:question_text>To find the location of the AIDE databse file, run the following command:
$ sudo ls -l DBDIR/database_file_name
			Is it the case that there is no database file?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_periodic_cron_checking_question:question:1">
          <ns0:question_text>To determine that periodic AIDE execution has been scheduled, run the following command:
$ grep aide /etc/crontab
The output should return some similiar to the following:
05 4 * * * root /usr/sbin/aide --check

NOTE: The usage of special cron times, such as @daily or @weekly, is acceptable.
			Is it the case that there is no output?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_scan_notification_question:question:1">
          <ns0:question_text>To determine that periodic AIDE execution has been scheduled, run the following command:
$ grep aide /etc/crontab
The output should return something similar to the following:
05 4 * * * root /usr/sbin/aide --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost
			Is it the case that AIDE has not been configured or has not been configured to notify personnel of scan details?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_verify_acls_question:question:1">
          <ns0:question_text>To determine that AIDE is verifying ACLs, run the following command:
$ grep acl /etc/aide.conf
Verify that the acl option is added to the correct ruleset.
			Is it the case that the acl option is missing or not added to the correct ruleset?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_verify_ext_attributes_question:question:1">
          <ns0:question_text>To determine that AIDE is verifying extended file attributes, run the following command:
$ grep xattrs /etc/aide.conf
Verify that the xattrs option is added to the correct ruleset.
			Is it the case that the xattrs option is missing or not added to the correct ruleset?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_aide_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if the aide package is installed: $ rpm -q aide
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-aide_check_audit_tools_question:question:1">
          <ns0:question_text>Check that AIDE is properly configured to protect the integrity of the audit tools by running the following command:

# sudo cat /etc/aide.conf | grep /usr/sbin/au

/usr/sbin/auditctl p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/auditd p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/ausearch p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/aureport p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/autrace p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/audispd p+i+n+u+g+s+b+acl+selinux+xattrs+sha512
/usr/sbin/augenrules p+i+n+u+g+s+b+acl+selinux+xattrs+sha512

If AIDE is configured properly to protect the integrity of the audit tools, all lines listed above will be returned from the command.

If one or more lines are missing, this is a finding.
			Is it the case that integrity checks of the audit tools are missing or incomplete?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-accounts_authorized_local_users_question:question:1">
          <ns0:question_text>To verify that there are no unauthorized local user accounts, run the following command:
$ less /etc/passwd 
Inspect the results, and if unauthorized local user accounts exist, remove them by running
the following command:
$ sudo userdel unauthorized_user
			Is it the case that there are unauthorized local user accounts on the system?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sudo_remove_no_authenticate_question:question:1">
          <ns0:question_text>To determine if !authenticate has not been configured for sudo, run the following command:
$ sudo grep -r \!authenticate /etc/sudoers /etc/sudoers.d/
The command should return no output.
			Is it the case that !authenticate is enabled in sudo?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sudo_remove_nopasswd_question:question:1">
          <ns0:question_text>To determine if NOPASSWD has been configured for sudo, run the following command:
$ sudo grep -ri nopasswd /etc/sudoers /etc/sudoers.d/
The command should return no output.
			Is it the case that nopasswd is enabled in sudo?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sudo_require_authentication_question:question:1">
          <ns0:question_text>To determine if NOPASSWD or !authenticate have been configured for
sudo, run the following command:
$ sudo grep -ri "nopasswd\|\!authenticate" /etc/sudoers /etc/sudoers.d/
The command should return no output.
			Is it the case that nopasswd and/or !authenticate is enabled in sudo?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-sudo_vdsm_nopasswd_question:question:1">
          <ns0:question_text>To determine if NOPASSWD has been configured for the vdsm user for sudo,
run the following command:
$ sudo grep -ri nopasswd /etc/sudoers.d/
The command should return output only for the vdsm user.
			Is it the case that nopasswd is set for any users beyond vdsm?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-clean_components_post_updating_question:question:1">
          <ns0:question_text>
To verify that solver.upgradeRemoveDroppedPackages is configured properly, run the
following command:
$ grep upgradeRemoveDroppedPackages /etc/zypp/zypp.conf
The output should return something similar to:
solver.upgradeRemoveDroppedPackages=true
			Is it the case that clean_requirements_on_remove is not enabled or configured correctly?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
          <ns0:question_text>To determine whether zypper is configured to use gpgcheck,
inspect /etc/zypp/zypp.conf and ensure the following appears in the
[main] section:
gpgcheck=1
A value of 1 indicates that gpgcheck is enabled. Absence of a
gpgcheck line or a setting of 0 indicates that it is
disabled.
			Is it the case that GPG checking is not enabled?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-security_patches_up_to_date_question:question:1">
          <ns0:question_text>
If the system is configured for online updates, invoking the following
command will indicate if updates are available:
$ sudo zypper list-patches -g security


If the system is not configured to update from one of these sources,
run the following command to list when each package was last updated:
$ rpm -qa -last


Compare this to SUSE Update Advisories listed at
https://www.suse.com/support/update/
to determine if the system is missing applicable updates.
			Is it the case that updates are not installed?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-blacklist_usb-storage_question:question:1">
          <ns0:question_text>Make sure that the usb-storage driver is blacklisted from being loaded through modprobe:
# grep -R usb-storage /etc/modprobe.{conf,d}
blacklist usb-storage

If nothing is output from the command above, this is a finding.
			Is it the case that USB mass storage devices may get auto-mounted?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-apparmor_configured_question:question:1">
          <ns0:question_text>Verify that the SUSE operating system Apparmor tool is configured to
control whitelisted applications and user home directory access control.

Check that pam_apparmor is installed on the system with the following
command:

# rpm -q pam_apparmor

Check that the "apparmor" daemon is running with the following command:

# systemctl status apparmor.service | grep -i active

Active: active (exited) since Fri 2017-01-13 01:01:01 GMT; 1day 1h ago

Note: pam_apparmor must have properly configured
profiles. All configurations will be based on the actual system setup and
organization.  See the pam_apparmor documentation for more
information on configuring profiles.
			Is it the case that it is not?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-service_apparmor_enabled_question:question:1">
          <ns0:question_text> Run the following command to determine the current status of the apparmor service: $ systemctl is-active apparmor If the service is running, it should return the following: active
			Is it the case that ?
			</ns0:question_text>
        </ns0:boolean_question>
        <ns0:boolean_question id="ocil:ssg-package_pam_apparmor_installed_question:question:1">
          <ns0:question_text>Run the following command to determine if the pam_apparmor package is installed: $ rpm -q pam_apparmor
			Is it the case that the package is not installed?
			</ns0:question_text>
        </ns0:boolean_question>
      </ns0:questions>
    </ns0:ocil>
  </ds:component>
  <ds:component id="scap_org.open-scap_comp_ssg-sle12-xccdf-1.2.xml" timestamp="2019-04-18T11:25:45">
    <Benchmark xmlns="http://checklists.nist.gov/xccdf/1.2" id="xccdf_org.ssgproject.content_benchmark_SLES-12" resolved="1" xml:lang="en-US" style="SCAP_1.2">
      <status date="2019-04-18">draft</status>
      <title xml:lang="en-US">Guide to the Secure Configuration of SUSE Linux Enterprise 12</title>
      <description xml:lang="en-US">This guide presents a catalog of security-relevant
configuration settings for SUSE Linux Enterprise 12. It is a rendering of
content structured in the eXtensible Configuration Checklist Description Format (XCCDF)
in order to support security automation.  The SCAP content is
is available in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">scap-security-guide</html:code> package which is developed at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Providing system administrators with such guidance informs them how to securely
configure systems under their control in a variety of network roles. Policy
makers and baseline creators can use this catalog of settings, with its
associated references to higher-level security control catalogs, in order to
assist them in security baseline creation. This guide is a <html:em xmlns:html="http://www.w3.org/1999/xhtml">catalog, not a
checklist</html:em>, and satisfaction of every item is not likely to be possible or
sensible in many operational scenarios. However, the XCCDF format enables
granular selection and adjustment of settings, and their association with OVAL
and OCIL content provides an automated checking capability. Transformations of
this document, and its associated automated checking content, are capable of
providing baselines that meet a diverse set of policy objectives. Some example
XCCDF <html:em xmlns:html="http://www.w3.org/1999/xhtml">Profiles</html:em>, which are selections of items that form checklists and
can be used as baselines, are available with this guide. They can be
processed, in an automated fashion, with tools that support the Security
Content Automation Protocol (SCAP). The DISA STIG, which provides required
settings for US Department of Defense systems, is one example of a baseline
created from this guidance.
</description>
      <notice xml:lang="en-US" id="terms_of_use">Do not attempt to implement any of the settings in
this guide without first testing them in a non-operational environment. The
creators of this guidance assume no responsibility whatsoever for its use by
other parties, and makes no guarantees, expressed or implied, about its
quality, reliability, or any other characteristic.
</notice>
      <front-matter xml:lang="en-US">The SCAP Security Guide Project<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a>
</front-matter>
      <rear-matter xml:lang="en-US">
SUSE is a registered trademark of SUSE LLC in the United States and other

countries. All other names are registered trademarks or trademarks of their
respective companies.
</rear-matter>
      <platform idref="cpe:/o:suse:linux_enterprise_server:12"/>
      <version update="https://github.com/OpenSCAP/scap-security-guide/releases/latest">0.1.44</version>
      <metadata>
        <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">SCAP Security Guide Project</dc:publisher>
        <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SCAP Security Guide Project</dc:creator>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Frank J Cameron (CAM1244) &lt;cameron@ctc.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">0x66656c6978 &lt;0x66656c6978@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Gabe Alford &lt;redhatrises@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Firas AlShafei &lt;firas.alshafei@us.abb.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Anderson &lt;cba@fedoraproject.org&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">angystardust &lt;angystardust@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Chuck Atkins &lt;chuck.atkins@kitware.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Ryan Ballanger &lt;root@rballang-admin-2.fastenal.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Alex Baranowski &lt;alex@euro-linux.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Molly Jo Bault &lt;Molly.Jo.Bault@ballardtech.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Gabriel Becker &lt;ggasparb@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Bergmann &lt;abergmann@suse.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jose Luis BG &lt;bgjoseluis@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Bisch &lt;joseph.bisch@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Blank &lt;blank@eclipse.ncsc.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Olivier Bonhomme &lt;ptitoliv@ptitoliv.net&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Ted Brunell &lt;tbrunell@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Blake Burkhart &lt;blake.burkhart@us.af.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Callahan &lt;pmc@patrickcallahan.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Nick Carboni &lt;ncarboni@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">James Cassell &lt;james.cassell@ll.mit.edu&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Frank Caviggia &lt;fcaviggi@ra.iad.redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Christensen &lt;echriste@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Caleb Cooper &lt;coopercd@ornl.gov&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Deric Crago &lt;deric.crago@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Maura Dailey &lt;maura@eclipse.ncsc.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Klaas Demter &lt;demter@atix.de&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">dhanushkar-wso2 &lt;dhanushkar@wso2.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew DiPrinzio &lt;andrew.diprinzio@jhuapl.edu&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jean-Baptiste Donnette &lt;jean-baptiste.donnette@epita.fr&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">drax &lt;applezip@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Greg Elin &lt;gregelin@gitmachines.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Leah Fisher &lt;lfisher047@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Alijohn Ghassemlouei &lt;alijohn.ghassemlouei@sapns2.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Gilmore &lt;agilmore2@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Joshua Glemza &lt;jglemza@nasa.gov&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Loren Gordon &lt;lorengordon@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Patrik Greco &lt;sikevux@sikevux.se&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Steve Grubb &lt;sgrubb@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Marek Haicman &lt;mhaicman@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Rebekah Hayes &lt;rhayes@corp.rivierautilities.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Trey Henefield &lt;thenefield@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Henning Henkel &lt;henning.henkel@helvetia.ch&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">hex2a &lt;hex2a@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">John Hooks &lt;jhooks@starscream.pa.jhbcomputers.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Robin Price II &lt;robin@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jeremiah Jahn &lt;jeremiah@goodinassociates.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Stephan Joerrens &lt;Stephan.Joerrens@fiduciagad.de&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kai Kang &lt;kai.kang@windriver.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Charles Kernstock &lt;charles.kernstock@ultra-ats.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Yuli Khodorkovskiy &lt;ykhodorkovskiy@tresys.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Lee Kinser &lt;lee.kinser@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Peter 'Pessoft' Kolínek &lt;github@pessoft.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Luke Kordell &lt;luke.t.kordell@lmco.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Malte Kraus &lt;malte.kraus@suse.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">kspargur &lt;kspargur@kspargur.csb&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Amit Kumar &lt;amitkuma@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Fen Labalme &lt;fen@civicactions.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Ian Lee &lt;lee1001@llnl.gov&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrett Lee &lt;jarrettl@umd.edu&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jan Lieskovsky &lt;jlieskov@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Šimon Lukašík &lt;slukasik@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Milan Lysonek &lt;mlysonek@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Fredrik Lysén &lt;fredrik@pipemore.se&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Matus Marhefka &lt;mmarhefk@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jamie Lorwey Martin &lt;jlmartin@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Michael McConachie &lt;michael@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Khary Mendez &lt;kharyam@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Rodney Mercer &lt;rmercer@harris.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Matt Micene &lt;nzwulfin@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Millett &lt;bmillett@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Mixer9 &lt;35545791+Mixer9@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">mmosel &lt;mmosel@kde.example.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Zbynek Moravec &lt;zmoravec@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kazuo Moriwaka &lt;moriwaka@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Moseley &lt;michael@eclipse.ncsc.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Joe Nall &lt;joe@nall.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Neiloy &lt;neiloy@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Axel Nennker &lt;axel@nennker.de&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Michele Newman &lt;mnewman@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Sean O'Keeffe &lt;seanokeeffe797@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Ilya Okomin &lt;ilya.okomin@oracle.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kaustubh Padegaonkar &lt;theTuxRacer@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Palmiotto &lt;mpalmiotto@tresys.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Max R.D. Parmer &lt;maxp@trystero.is&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">pcactr &lt;paul.c.arnold4.ctr@mail.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kenneth Peeples &lt;kennethwpeeples@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Nathan Peters &lt;Nathaniel.Peters@ca.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Frank Lin PIAT &lt;fpiat@klabs.be&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Stefan Pietsch &lt;mail.ipv4v6+gh@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Martin Preisler &lt;mpreisle@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Wesley Ceraso Prudencio &lt;wcerasop@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Raphael Sanchez Prudencio &lt;rsprudencio@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">T.O. Radzy Radzykewycz &lt;radzy@windriver.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kenyon Ralph &lt;kenyon@kenyonralph.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Renshaw &lt;Richard_Renshaw@xtoenergy.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Chris Reynolds &lt;c.reynolds82@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">rhayes &lt;rhayes@rivierautilities.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Pat Riehecky &lt;riehecky@fnal.gov&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">rlucente-se-jboss &lt;rlucente@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Joshua Roys &lt;roysjosh@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">rrenshaw &lt;bofh69@yahoo.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Chris Ruffalo &lt;chris.ruffalo@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Ray Shaw (Cont ARL/CISD) rvshaw &lt;rvshaw@esme.arl.army.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Willy Santos &lt;wsantos@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Gautam Satish &lt;gautams@hpe.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Watson Sato &lt;wsato@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Satoru SATOH &lt;satoru.satoh@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Scheel &lt;ascheel@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Spencer Shimko &lt;sshimko@tresys.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Sjögren &lt;konstruktoid@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Francisco Slavin &lt;fslavin@tresys.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">David Smith &lt;dsmith@eclipse.ncsc.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Spargur &lt;kspargur@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kenneth Stailey &lt;kstailey.lists@gmail.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Leland Steinke &lt;leland.j.steinke.ctr@mail.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Stinson &lt;brian@bstinson.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Philippe Thierry &lt;phil@reseau-libre.net&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Tittle &lt;ptittle@cmf.nrl.navy.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">tomas.hudik &lt;tomas.hudik@embedit.cz&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jeb Trayer &lt;jeb.d.trayer@uscg.mil&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Matěj Týč &lt;matyc@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">VadimDor &lt;29509093+VadimDor@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Shawn Wells &lt;shawn@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel E. White &lt;linuxdan@users.noreply.github.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Roy Williams &lt;roywilli@roywilli.redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Rob Wilmoth &lt;rwilmoth@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Lucas Yamanishi &lt;lucas.yamanishi@onyxpoint.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Xirui Yang &lt;xirui.yang@oracle.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Zimmerman &lt;kevin.zimmerman@kitware.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Jan Černý &lt;jcerny@redhat.com&gt;</dc:contributor>
        <dc:contributor xmlns:dc="http://purl.org/dc/elements/1.1/">Michal Šrubař &lt;msrubar@redhat.com&gt;</dc:contributor>
        <dc:source xmlns:dc="http://purl.org/dc/elements/1.1/">https://github.com/OpenSCAP/scap-security-guide/releases/latest</dc:source>
      </metadata>
      <model system="urn:xccdf:scoring:default"/>
      <Profile id="xccdf_org.ssgproject.content_profile_standard">
        <title xml:lang="en-US" override="true">Standard System Security Profile for SUSE Linux Enterprise 12</title>
        <description xml:lang="en-US" override="true">This profile contains rules to ensure standard security baseline
of a SUSE Linux Enterprise 12 system. Regardless of your system's workload
all of these checks should pass.</description>
        <select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_services" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_apt" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_avahi" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disable_avahi_group" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_base" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_cron_and_at" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_deprecated" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_docker" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_http" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_perl_securely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_secure_content" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_imap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ldap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mail" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_cfg" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_dos" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_require_tls" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_set_trusted" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_smtp_auth_for_untrusted" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ntp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_obsolete" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_inetd_and_xinetd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nis" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_r_services" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_talk" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_telnet" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_tftp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_proxy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_routing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_quagga" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_snmp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ssh" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ssh_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sssd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sssd-ldap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts-banners" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts-pam" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_locking_out_password_attempts" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_quality" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_quality_pamcracklib" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_quality_pwquality" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_set_password_hashing_algorithm" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts-physical" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts-restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_expiration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_storage" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_root_logins" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_accounts-session" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_auditing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_auditd_configure_rules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_dac_actions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_execution_selinux_commands" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_file_deletion_events" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_kernel_module_loading" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_login_events" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_privileged_commands" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_time_rules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_unsuccessful_file_modification" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_auditd_data_retention" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_bootloader-grub-legacy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_bootloader-grub2" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_entropy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_logging" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_log_rotation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-firewalld" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_firewalld_activation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-iptables" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_activation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_ruleset_modifications" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-ipv6" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configuring_ipv6" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_ipv6" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-kernel" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_host_and_router_parameters" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_host_parameters" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-uncommon" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-susefirewall2" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_permissions_within_important_dirs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mounting" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_partitions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_enable_execshield_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_poisoning" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_permissions_local" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_selinux" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_selinux-booleans" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disk_partitioning" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_screen_locking" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_integrity" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_crypto" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_endpoint_security_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mcafee_security_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mcafee_hbss_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_fips" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_software-integrity" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_aide" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sudo" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_updating" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_kernel" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_apparmor" selected="false"/>
      </Profile>
      <Profile id="xccdf_org.ssgproject.content_profile_stig-sle12-disa">
        <title xml:lang="en-US" override="true">DISA STIG for SUSE Linux Enterprise 12</title>
        <description xml:lang="en-US" override="true">This profile contains configuration checks that align to the 
  DISA STIG for SUSE Linux Enterprise 12.</description>
        <select idref="xccdf_org.ssgproject.content_rule_installed_OS_is_certified" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_gui_login_dod_acknowledgement" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_banner_etc_motd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_banner_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_login_banner_text" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_vlock_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sudo_remove_no_authenticate" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sudo_remove_nopasswd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_tally2" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_logon_fail_delay" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_ucredit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_lcredit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_dcredit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_ocredit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_difok" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_commonauth" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed_sha512" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_min_rounds_logindefs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_minlen" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_minimum_age_shadow" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_maximum_age_shadow" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_etc_security_opasswd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_faildelay" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_automatic_login" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_openssh_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_sshd_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_set_loglevel_verbose" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_print_last_log" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_macs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_disable_user_known_hosts" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_sshd_pub_key" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_sshd_private_key" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_enable_strictmodes" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_use_priv_separation" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_disable_compression" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sshd_enable_x11_forwarding" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_no_user_host_based_files" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_no_host_based_files" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_enable_fips_mode" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_grub2_password" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_grub2_uefi_password" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_aide_scan_notification" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_aide_verify_acls" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_aide_verify_ext_attributes" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_aide_check_audit_tools" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_clean_components_post_updating" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_use_text_backend" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_disable_ctrlaltdel_reboot" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_unique_id" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sssd_memcache_timeout" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sssd_offline_cred_expiration" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_user_interactive_home_directory_exists" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_user_interactive_home_directory_defined" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_have_homedir_login_defs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_home_directories" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_users_home_files_groupownership" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_user_home_paths_only" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_user_dot_no_world_writable_programs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_mount_home_directories_nosuid" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_mount_option_nfs_nosuid" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_mount_option_nfs_noexec" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_ntp_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_chronyd_or_ntpd_set_maxpoll" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_ensure_rtc_utc_configuration" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_partition_for_home_dirs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_messages" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_pam_disable_automatic_configuration" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_audit_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_kptr_restrict" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_configure_sufficiently_large_partition" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_data_disk_full_action" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_audit-audispd-plugins_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_encrypt_sent_records" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_configure_remote_server" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_network_failure_action" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_disk_full_action" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_suid_privilege_function" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chfn" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_ssh_keysign" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_insmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_rmmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_modprobe" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passmass" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_usermod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_pam_timestamp_check" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_chmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_setfacl" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_chacl" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_rm" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_crontab" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_execution_ssh-agent" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_mount" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_umount" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_umount2" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_open" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_truncate" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_ftruncate" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_creat" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_openat" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_open_by_handle_at" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_gshadow" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_shadow" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_group" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_opasswd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_passwd" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events_tallylog" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events_lastlog" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events_faillog" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_finit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_banner_etc_gdm_banner" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_SuSEfirewall2_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_susefirewall2_only_required_services" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_susefirewall2_ddos_protection" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_install_smartcard_packages" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_smartcard_configure_cert_checking" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_smartcard_pam_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_smartcard_configure_ca" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_blacklist_usb-storage" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permission_user_init_files" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_permissions_local_var_log_audit" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_permissions_local_audit_binaries" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_account_emergency_admin" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_policy_temp_passwords_immediate_change" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_groupowned" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_run_chkstat" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_enable_lock_screen" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_screensaver_idle_delay" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_dconf_gnome_screensaver_mode_blank" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_postfix_client_configure_mail_alias" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_authorized_local_users" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_enable_dconf_user_profile" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_package_pam_apparmor_installed" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_service_apparmor_enabled" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_apparmor_configured" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_rule_audit_rules_enable_syscall_auditing" selected="true"/>
        <select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_apt" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_avahi" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disable_avahi_group" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_cron_and_at" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_deprecated" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_docker" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_http" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_perl_securely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_secure_content" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_imap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ldap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_cfg" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_dos" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_require_tls" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_set_trusted" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_postfix_server_relay_smtp_auth_for_untrusted" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_inetd_and_xinetd" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_nis" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_talk" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_tftp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_proxy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_routing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_quagga" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_snmp" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_sssd-ldap" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_password_quality_pwquality" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_root_logins" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_file_deletion_events" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_audit_time_rules" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_bootloader-grub-legacy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_entropy" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_log_rotation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-firewalld" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_firewalld_activation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-iptables" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_activation" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_ruleset_modifications" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_disabling_ipv6" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network-uncommon" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_permissions_within_important_dirs" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_poisoning" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_selinux" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_selinux-booleans" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_crypto" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_endpoint_security_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mcafee_security_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_mcafee_hbss_software" selected="false"/>
        <select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="35"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="dod_default"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="10"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" selector="4"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="15"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="1"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="60"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_sshd_required" selector="yes"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="10_minutes"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_sshd_set_keepalive" selector="1"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_sshd_priv_separation" selector="yes"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_system_crypto_policy" selector="fips"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" selector="1_day"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll" selector="system_default"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_authorized_local_users_regex" selector="none"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_multiple_time_servers" selector="sles"/>
        <refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077"/>
      </Profile>
      <Group id="xccdf_org.ssgproject.content_group_remediation_functions">
        <title xml:lang="en-US">Remediation functions used by the SCAP Security Guide Project</title>
        <description xml:lang="en-US">XCCDF form of the various remediation functions as used by remediation scripts from the SCAP Security Guide Project.</description>
        <Value id="xccdf_org.ssgproject.content_value_function_die" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function die</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Print a message to stderr and exit the shell
# $1: The message to print.
# $2: The error code (optional, default is 1)
function die {
	local _message="$1" _rc="${2:-1}"
	printf '%s\n' "$_message" &gt;&amp;2
	exit "$_rc"
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_disable_prelink" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function disable_prelink</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function disable_prelink {
	# Disable prelinking and don't even check
	# whether it is installed.
	if grep -q ^PRELINKING /etc/sysconfig/prelink
	then
		sed -i 's/^PRELINKING[:blank:]*=[:blank:]*[:alpha:]*/PRELINKING=no/' /etc/sysconfig/prelink
	else
		printf '\n' &gt;&gt; /etc/sysconfig/prelink
		printf '%s\n' '# Set PRELINKING=no per security requirements' 'PRELINKING=no' &gt;&gt; /etc/sysconfig/prelink
	fi

	# Undo previous prelink changes to binaries if prelink is available.
	if test -x /usr/sbin/prelink; then
		/usr/sbin/prelink -ua
	fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_ensure_there_are_servers_in_ntp_compatible_config_file" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function ensure_there_are_servers_in_ntp_compatible_config_file</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function ensures that the ntp/chrony config file contains valid server entries
# $1: Path to the config file
# $2: Comma-separated list of servers
function ensure_there_are_servers_in_ntp_compatible_config_file {
	# If invoked with no arguments, exit. This is an intentional behavior.
	[ $# -gt 1 ] || return 0
	[ $# = 2 ] || die "$0 requires zero or exactly two arguments"
	local _config_file="$1" _servers_list="$2"
	if ! grep -q '#[[:space:]]*server' "$_config_file"; then
		for server in $(echo "$_servers_list" | tr ',' '\n') ; do
			printf '\nserver %s iburst' "$server" &gt;&gt; "$_config_file"
		done
	else
		sed -i 's/#[ \t]*server/server/g' "$_config_file"
	fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_firefox_cfg_setting" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function firefox_cfg_setting</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to replace configuration setting(s) in the Firefox preferences configuration (.cfg) file or add the
# preference if it does not exist.
#
# Expects three arguments:
#
# config_file:          Configuration file that will be modified
# key:                  Configuration option to change
# value:                Value of the configuration option to change
#
#
# Example Call(s):
#
#     Without string or variable:
#     firefox_cfg_setting "stig.cfg" "extensions.update.enabled" "false"
#
#     With string:
#     firefox_cfg_setting "stig.cfg" "security.default_personal_cert" "\"Ask Every Time\""
#
#     With a string variable:
#     firefox_cfg_setting "stig.cfg" "browser.startup.homepage\" "\"${var_default_home_page}\""
#
function firefox_cfg_setting {
  local firefox_cfg=$1
  local key=$2
  local value=$3
  local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"

  # Check sanity of input
  if [ $# -lt "3" ]
  then
        echo "Usage: firefox_cfg_setting 'config_cfg_file' 'key_to_search' 'new_value'"
        echo
        echo "Aborting."
        exit 1
  fi

  # Check the possible Firefox install directories
  for firefox_dir in ${firefox_dirs}; do
    # If the Firefox directory exists, then Firefox is installed
    if [ -d "${firefox_dir}" ]; then
      # Make sure the Firefox .cfg file exists and has the appropriate permissions
      if ! [ -f "${firefox_dir}/${firefox_cfg}" ] ; then
        touch "${firefox_dir}/${firefox_cfg}"
        chmod 644 "${firefox_dir}/${firefox_cfg}"
      fi

      # If the key exists, change it. Otherwise, add it to the config_file.
      if LC_ALL=C grep -m 1 -q "^lockPref(\"${key}\", " "${firefox_dir}/${firefox_cfg}"; then
        sed -i "s/lockPref(\"${key}\".*/lockPref(\"${key}\", ${value});/g" "${firefox_dir}/${firefox_cfg}"
      else
        echo "lockPref(\"${key}\", ${value});" &gt;&gt; "${firefox_dir}/${firefox_cfg}"
      fi
    fi
  done
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_firefox_js_setting" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function firefox_js_setting</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to replace configuration setting(s) in the Firefox preferences JavaScript file or add the
# preference if it does not exist.
#
# Expects three arguments:
#
# config_file:          Configuration file that will be modified
# key:                  Configuration option to change
# value:                Value of the configuration option to change
#
#
# Example Call(s):
#
#     Without string or variable:
#     firefox_js_setting "stig_settings.js" "general.config.obscure_value" "0"
#
#     With string:
#     firefox_js_setting "stig_settings.js" "general.config.filename" "\"stig.cfg\""
#
#     With a string variable:
#     firefox_js_setting "stig_settings.js" "general.config.filename" "\"$var_config_file_name\""
#
function firefox_js_setting {
  local firefox_js=$1
  local key=$2
  local value=$3
  local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"
  local firefox_pref="/defaults/pref"
  local firefox_preferences="/defaults/preferences"

  # Check sanity of input
  if [ $# -lt "3" ]
  then
        echo "Usage: firefox_js_setting 'config_javascript_file' 'key_to_search' 'new_value'"
        echo
        echo "Aborting."
        exit 1
  fi

  # Check the possible Firefox install directories
  for firefox_dir in ${firefox_dirs}; do
    # If the Firefox directory exists, then Firefox is installed
    if [ -d "${firefox_dir}" ]; then
      # Different versions of Firefox have different preferences directories, check for them and set the right one
      if [ -d "${firefox_dir}/${firefox_pref}" ] ; then
        local firefox_pref_dir="${firefox_dir}/${firefox_pref}"
      elif [ -d "${firefox_dir}/${firefox_preferences}" ] ; then
        local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
      else
        mkdir -m 755 -p "${firefox_dir}/${firefox_preferences}"
        local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
      fi

      # Make sure the Firefox .js file exists and has the appropriate permissions
      if ! [ -f "${firefox_pref_dir}/${firefox_js}" ] ; then
        touch "${firefox_pref_dir}/${firefox_js}"
        chmod 644 "${firefox_pref_dir}/${firefox_js}"
      fi

      # If the key exists, change it. Otherwise, add it to the config_file.
      if LC_ALL=C grep -m 1 -q "^pref(\"${key}\", " "${firefox_pref_dir}/${firefox_js}"; then
        sed -i "s/pref(\"${key}\".*/pref(\"${key}\", ${value});/g" "${firefox_pref_dir}/${firefox_js}"
      else
        echo "pref(\"${key}\", ${value});" &gt;&gt; "${firefox_pref_dir}/${firefox_js}"
      fi
    fi
  done

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function fix_audit_syscall_rule</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to fix syscall audit rule for given system call. It is
# based on example audit syscall rule definitions as outlined in
# /usr/share/doc/audit-2.3.7/stig.rules file provided with the audit
# package. It will combine multiple system calls belonging to the same
# syscall group into one audit rule (rather than to create audit rule per
# different system call) to avoid audit infrastructure performance penalty
# in the case of 'one-audit-rule-definition-per-one-system-call'. See:
#
#   https://www.redhat.com/archives/linux-audit/2014-November/msg00009.html
#
# for further details.
#
# Expects five arguments (each of them is required) in the form of:
# * audit tool				tool used to load audit rules,
# 					either 'auditctl', or 'augenrules
# * audit rules' pattern		audit rule skeleton for same syscall
# * syscall group			greatest common string this rule shares
# 					with other rules from the same group
# * architecture			architecture this rule is intended for
# * full form of new rule to add	expected full form of audit rule as to be
# 					added into audit.rules file
#
# Note: The 2-th up to 4-th arguments are used to determine how many existing
# audit rules will be inspected for resemblance with the new audit rule
# (5-th argument) the function is going to add. The rule's similarity check
# is performed to optimize audit.rules definition (merge syscalls of the same
# group into one rule) to avoid the "single-syscall-per-audit-rule" performance
# penalty.
#
# Example call:
#
#	See e.g. 'audit_rules_file_deletion_events.sh' remediation script
#
function fix_audit_syscall_rule {

# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"

# Check sanity of the input
if [ $# -ne "5" ]
then
	echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
	echo "Aborting."
	exit 1
fi

# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
# 
# -----------------------------------------------------------------------------------------
#  Tool used to load audit rules | Rule already defined  |  Audit rules file to inspect    |
# -----------------------------------------------------------------------------------------
#        auditctl                |     Doesn't matter    |  /etc/audit/audit.rules         |
# -----------------------------------------------------------------------------------------
#        augenrules              |          Yes          |  /etc/audit/rules.d/*.rules     |
#        augenrules              |          No           |  /etc/audit/rules.d/$key.rules  |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect

retval=0

# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] &amp;&amp; [ "$tool" != 'augenrules' ]
then
	echo "Unknown audit rules loading tool: $1. Aborting."
	echo "Use either 'auditctl' or 'augenrules'!"
	return 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
	files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
	# Extract audit $key from audit rule so we can use it later
	key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)' '|' "$full_rule" : '.*-F[[:space:]]key=\([^[:space:]]\+\)')
	IFS_BKP="$IFS"
	# Check if particular audit rule is already defined
	IFS=$'\n'
	matches=($(sed -s -n -e "\;${pattern};!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
	if [ $? -ne 0 ]
	then
		retval=1
	fi
	# Reset IFS back to default
	IFS="$IFS_BKP"
	for match in "${matches[@]}"
	do
		files_to_inspect=("${files_to_inspect[@]}" "${match}")
	done
	# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
	if [ ${#files_to_inspect[@]} -eq "0" ]
	then
		files_to_inspect="/etc/audit/rules.d/$key.rules"
		if [ ! -e "$files_to_inspect" ]
		then
			touch "$files_to_inspect"
			chmod 0640 "$files_to_inspect"
		fi
	fi
fi

#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0

for audit_file in "${files_to_inspect[@]}"
do

	IFS_BKP="$IFS"
	# Filter existing $audit_file rules' definitions to select those that:
	# * follow the rule pattern, and
	# * meet the hardware architecture requirement, and
	# * are current syscall group specific
	IFS=$'\n'
	existing_rules=($(sed -e "\;${pattern};!d" -e "/${arch}/!d" -e "/${group}/!d"  "$audit_file"))
	if [ $? -ne 0 ]
	then
		retval=1
	fi
	# Reset IFS back to default
	IFS="$IFS_BKP"

	# Process rules found case-by-case
	for rule in "${existing_rules[@]}"
	do
		# Found rule is for same arch &amp; key, but differs (e.g. in count of -S arguments)
		if [ "${rule}" != "${full_rule}" ]
		then
			# If so, isolate just '(-S \w)+' substring of that rule
			rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
			# Check if list of '-S syscall' arguments of that rule is subset
			# of '-S syscall' list of expected $full_rule
			if grep -q -- "$rule_syscalls" &lt;&lt;&lt; "$full_rule"
			then
				# Rule is covered (i.e. the list of -S syscalls for this rule is
				# subset of -S syscalls of $full_rule =&gt; existing rule can be deleted
				# Thus delete the rule from audit.rules &amp; our array
				sed -i -e "\;${rule};d" "$audit_file"
				if [ $? -ne 0 ]
				then
					retval=1
				fi
				existing_rules=("${existing_rules[@]//$rule/}")
			else
				# Rule isn't covered by $full_rule - it besides -S syscall arguments
				# for this group contains also -S syscall arguments for other syscall
				# group. Example: '-S lchown -S fchmod -S fchownat' =&gt; group='chown'
				# since 'lchown' &amp; 'fchownat' share 'chown' substring
				# Therefore:
				# * 1) delete the original rule from audit.rules
				# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
				# * 2) delete the -S syscall arguments for this syscall group, but
				# keep those not belonging to this syscall group
				# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
				# * 3) append the modified (filtered) rule again into audit.rules
				# if the same rule not already present
				#
				# 1) Delete the original rule
				sed -i -e "\;${rule};d" "$audit_file"
				if [ $? -ne 0 ]
				then
					retval=1
				fi
				IFS_BKP="$IFS"
				# 2) Delete syscalls for this group, but keep those from other groups
				# Convert current rule syscall's string into array splitting by '-S' delimiter
				IFS=$'-S'
				read -a rule_syscalls_as_array &lt;&lt;&lt; "$rule_syscalls"
				# Reset IFS back to default
				IFS="$IFS_BKP"
				# Declare new empty string to hold '-S syscall' arguments from other groups
				new_syscalls_for_rule=''
				# Walk through existing '-S syscall' arguments
				for syscall_arg in "${rule_syscalls_as_array[@]}"
				do
					# Skip empty $syscall_arg values
					if [ "$syscall_arg" == '' ]
					then
						continue
					fi
					# If the '-S syscall' doesn't belong to current group add it to the new list
					# (together with adding '-S' delimiter back for each of such item found)
					if grep -q -v -- "$group" &lt;&lt;&lt; "$syscall_arg"
					then
						new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
					fi
				done
				# Replace original '-S syscall' list with the new one for this rule
				updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
				# Squeeze repeated whitespace characters in rule definition (if any) into one
				updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
				# 3) Append the modified / filtered rule again into audit.rules
				#    (but only in case it's not present yet to prevent duplicate definitions)
				if ! grep -q -- "$updated_rule" "$audit_file"
				then
					echo "$updated_rule" &gt;&gt; "$audit_file"
				fi
			fi
		else
			# $audit_file already contains the expected rule form for this
			# architecture &amp; key =&gt; don't insert it second time
			append_expected_rule=1
		fi
	done

	# We deleted all rules that were subset of the expected one for this arch &amp; key.
	# Also isolated rules containing system calls not from this system calls group.
	# Now append the expected rule if it's not present in $audit_file yet
	if [[ ${append_expected_rule} -eq "0" ]]
	then
		echo "$full_rule" &gt;&gt; "$audit_file"
	fi
done

return $retval

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_include_set_faillock_option" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function include_set_faillock_option</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function include_set_faillock_option {
	:
}

function insert_preauth {
	local pam_file="$1"
	local option="$2"
	local value="$3"
	# is auth required pam_faillock.so preauth present?
	if grep -qE "^\s*auth\s+required\s+pam_faillock\.so\s+preauth.*$" "$pam_file" ; then
		# is the option set?
		if grep -qE "^\s*auth\s+required\s+pam_faillock\.so\s+preauth.*$option=([0-9]*).*$" "$pam_file" ; then
			# just change the value of option to a correct value
			sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\($option *= *\).*/\1\2$value/" "$pam_file"
		# the option is not set.
		else
			# append the option
			sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ $option=$value/" "$pam_file"
		fi
	# auth required pam_faillock.so preauth is not present, insert the whole line
	else
		sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth        required      pam_faillock.so preauth silent $option=$value" "$pam_file"
	fi
}

function insert_authfail {
	local pam_file="$1"
	local option="$2"
	local value="$3"
	# is auth default pam_faillock.so authfail present?
	if grep -qE "^\s*auth\s+(\[default=die\])\s+pam_faillock\.so\s+authfail.*$" "$pam_file" ; then
		# is the option set?
		if grep -qE "^\s*auth\s+(\[default=die\])\s+pam_faillock\.so\s+authfail.*$option=([0-9]*).*$" "$pam_file" ; then
			# just change the value of option to a correct value
			sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\($option *= *\).*/\1\2$value/" "$pam_file"
		# the option is not set.
		else
			# append the option
			sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ $option=$value/" "$pam_file"
		fi
	# auth default pam_faillock.so authfail is not present, insert the whole line
	else
		sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth        [default=die] pam_faillock.so authfail $option=$value" "$pam_file"
	fi
}

function insert_account {
	local pam_file="$1"
	if ! grep -qE "^\s*account\s+required\s+pam_faillock\.so.*$" "$pam_file" ; then
		sed -E -i --follow-symlinks "/^\s*account\s*required\s*pam_unix.so/i account     required      pam_faillock.so" "$pam_file"
	fi
}

function set_faillock_option {
	local pam_file="$1"
	local option="$2"
	local value="$3"
	insert_preauth "$pam_file" "$option" "$value"
	insert_authfail "$pam_file" "$option" "$value"
	insert_account "$pam_file"
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_perform_audit_adjtimex_settimeofday_stime_remediation" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function perform_audit_adjtimex_settimeofday_stime_remediation</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to fix syscall audit rule for given system call. It is
# based on example audit syscall rule definitions as outlined in
# /usr/share/doc/audit-2.3.7/stig.rules file provided with the audit
# package. It will combine multiple system calls belonging to the same
# syscall group into one audit rule (rather than to create audit rule per
# different system call) to avoid audit infrastructure performance penalty
# in the case of 'one-audit-rule-definition-per-one-system-call'. See:
#
#   https://www.redhat.com/archives/linux-audit/2014-November/msg00009.html
#
# for further details.
#
# Expects five arguments (each of them is required) in the form of:
# * audit tool				tool used to load audit rules,
# 					either 'auditctl', or 'augenrules
# * audit rules' pattern		audit rule skeleton for same syscall
# * syscall group			greatest common string this rule shares
# 					with other rules from the same group
# * architecture			architecture this rule is intended for
# * full form of new rule to add	expected full form of audit rule as to be
# 					added into audit.rules file
#
# Note: The 2-th up to 4-th arguments are used to determine how many existing
# audit rules will be inspected for resemblance with the new audit rule
# (5-th argument) the function is going to add. The rule's similarity check
# is performed to optimize audit.rules definition (merge syscalls of the same
# group into one rule) to avoid the "single-syscall-per-audit-rule" performance
# penalty.
#
# Example call:
#
#	See e.g. 'audit_rules_file_deletion_events.sh' remediation script
#
function fix_audit_syscall_rule {

# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"

# Check sanity of the input
if [ $# -ne "5" ]
then
	echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
	echo "Aborting."
	exit 1
fi

# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
# 
# -----------------------------------------------------------------------------------------
#  Tool used to load audit rules | Rule already defined  |  Audit rules file to inspect    |
# -----------------------------------------------------------------------------------------
#        auditctl                |     Doesn't matter    |  /etc/audit/audit.rules         |
# -----------------------------------------------------------------------------------------
#        augenrules              |          Yes          |  /etc/audit/rules.d/*.rules     |
#        augenrules              |          No           |  /etc/audit/rules.d/$key.rules  |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect

retval=0

# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] &amp;&amp; [ "$tool" != 'augenrules' ]
then
	echo "Unknown audit rules loading tool: $1. Aborting."
	echo "Use either 'auditctl' or 'augenrules'!"
	return 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
	files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
	# Extract audit $key from audit rule so we can use it later
	key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)' '|' "$full_rule" : '.*-F[[:space:]]key=\([^[:space:]]\+\)')
	IFS_BKP="$IFS"
	# Check if particular audit rule is already defined
	IFS=$'\n'
	matches=($(sed -s -n -e "\;${pattern};!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
	if [ $? -ne 0 ]
	then
		retval=1
	fi
	# Reset IFS back to default
	IFS="$IFS_BKP"
	for match in "${matches[@]}"
	do
		files_to_inspect=("${files_to_inspect[@]}" "${match}")
	done
	# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
	if [ ${#files_to_inspect[@]} -eq "0" ]
	then
		files_to_inspect="/etc/audit/rules.d/$key.rules"
		if [ ! -e "$files_to_inspect" ]
		then
			touch "$files_to_inspect"
			chmod 0640 "$files_to_inspect"
		fi
	fi
fi

#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0

for audit_file in "${files_to_inspect[@]}"
do

	IFS_BKP="$IFS"
	# Filter existing $audit_file rules' definitions to select those that:
	# * follow the rule pattern, and
	# * meet the hardware architecture requirement, and
	# * are current syscall group specific
	IFS=$'\n'
	existing_rules=($(sed -e "\;${pattern};!d" -e "/${arch}/!d" -e "/${group}/!d"  "$audit_file"))
	if [ $? -ne 0 ]
	then
		retval=1
	fi
	# Reset IFS back to default
	IFS="$IFS_BKP"

	# Process rules found case-by-case
	for rule in "${existing_rules[@]}"
	do
		# Found rule is for same arch &amp; key, but differs (e.g. in count of -S arguments)
		if [ "${rule}" != "${full_rule}" ]
		then
			# If so, isolate just '(-S \w)+' substring of that rule
			rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
			# Check if list of '-S syscall' arguments of that rule is subset
			# of '-S syscall' list of expected $full_rule
			if grep -q -- "$rule_syscalls" &lt;&lt;&lt; "$full_rule"
			then
				# Rule is covered (i.e. the list of -S syscalls for this rule is
				# subset of -S syscalls of $full_rule =&gt; existing rule can be deleted
				# Thus delete the rule from audit.rules &amp; our array
				sed -i -e "\;${rule};d" "$audit_file"
				if [ $? -ne 0 ]
				then
					retval=1
				fi
				existing_rules=("${existing_rules[@]//$rule/}")
			else
				# Rule isn't covered by $full_rule - it besides -S syscall arguments
				# for this group contains also -S syscall arguments for other syscall
				# group. Example: '-S lchown -S fchmod -S fchownat' =&gt; group='chown'
				# since 'lchown' &amp; 'fchownat' share 'chown' substring
				# Therefore:
				# * 1) delete the original rule from audit.rules
				# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
				# * 2) delete the -S syscall arguments for this syscall group, but
				# keep those not belonging to this syscall group
				# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
				# * 3) append the modified (filtered) rule again into audit.rules
				# if the same rule not already present
				#
				# 1) Delete the original rule
				sed -i -e "\;${rule};d" "$audit_file"
				if [ $? -ne 0 ]
				then
					retval=1
				fi
				IFS_BKP="$IFS"
				# 2) Delete syscalls for this group, but keep those from other groups
				# Convert current rule syscall's string into array splitting by '-S' delimiter
				IFS=$'-S'
				read -a rule_syscalls_as_array &lt;&lt;&lt; "$rule_syscalls"
				# Reset IFS back to default
				IFS="$IFS_BKP"
				# Declare new empty string to hold '-S syscall' arguments from other groups
				new_syscalls_for_rule=''
				# Walk through existing '-S syscall' arguments
				for syscall_arg in "${rule_syscalls_as_array[@]}"
				do
					# Skip empty $syscall_arg values
					if [ "$syscall_arg" == '' ]
					then
						continue
					fi
					# If the '-S syscall' doesn't belong to current group add it to the new list
					# (together with adding '-S' delimiter back for each of such item found)
					if grep -q -v -- "$group" &lt;&lt;&lt; "$syscall_arg"
					then
						new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
					fi
				done
				# Replace original '-S syscall' list with the new one for this rule
				updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
				# Squeeze repeated whitespace characters in rule definition (if any) into one
				updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
				# 3) Append the modified / filtered rule again into audit.rules
				#    (but only in case it's not present yet to prevent duplicate definitions)
				if ! grep -q -- "$updated_rule" "$audit_file"
				then
					echo "$updated_rule" &gt;&gt; "$audit_file"
				fi
			fi
		else
			# $audit_file already contains the expected rule form for this
			# architecture &amp; key =&gt; don't insert it second time
			append_expected_rule=1
		fi
	done

	# We deleted all rules that were subset of the expected one for this arch &amp; key.
	# Also isolated rules containing system calls not from this system calls group.
	# Now append the expected rule if it's not present in $audit_file yet
	if [[ ${append_expected_rule} -eq "0" ]]
	then
		echo "$full_rule" &gt;&gt; "$audit_file"
	fi
done

return $retval

}


# Function to perform remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on RHEL, Fedora or OL systems.
# Remediation performed for both possible tools: 'auditctl' and 'augenrules'.
#
# Note: 'stime' system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
# therefore excluded from the list of time group system calls to be audited on this arch
#
# Example Call:
#
#      perform_audit_adjtimex_settimeofday_stime_remediation
#
function perform_audit_adjtimex_settimeofday_stime_remediation {

# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do

	PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
	# Create expected audit group and audit rule form for particular system call &amp; architecture
	if [ ${ARCH} = "b32" ]
	then
		# stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
		# so append it to the list of time group system calls to be audited
		GROUP="\(adjtimex\|settimeofday\|stime\)"
		FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
	elif [ ${ARCH} = "b64" ]
	then
		# stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
		# therefore don't add it to the list of time group system calls to be audited
		GROUP="\(adjtimex\|settimeofday\)"
		FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
	fi
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_populate" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function populate</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># The populate function isn't directly used by SSG at the moment but it can be 
# used for testing purposes and will be used in SSG Testsuite in the future.

function populate {
# code to populate environment variables needed (for unit testing)
if [ -z "${!1}" ]; then
	echo "$1 is not defined. Exiting."
	exit
fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_replace_or_append" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function replace_or_append</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to replace configuration setting in config file or add the configuration setting if
# it does not exist.
#
# Expects arguments:
#
# config_file:		Configuration file that will be modified
# key:			Configuration option to change
# value:		Value of the configuration option to change
# cce:			The CCE identifier or '@CCENUM@' if no CCE identifier exists
# format:		The printf-like format string that will be given stripped key and value as arguments,
#			so e.g. '%s=%s' will result in key=value subsitution (i.e. without spaces around =)
#
# Optional arugments:
#
# format:		Optional argument to specify the format of how key/value should be
# 			modified/appended in the configuration file. The default is key = value.
#
# Example Call(s):
#
#     With default format of 'key = value':
#     replace_or_append '/etc/sysctl.conf' '^kernel.randomize_va_space' '2' '@CCENUM@'
#
#     With custom key/value format:
#     replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' 'disabled' '@CCENUM@' '%s=%s'
#
#     With a variable:
#     replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' $var_selinux_state '@CCENUM@' '%s=%s'
#
function replace_or_append {
  local default_format='%s = %s' case_insensitive_mode=yes sed_case_insensitive_option='' grep_case_insensitive_option=''
  local config_file=$1
  local key=$2
  local value=$3
  local cce=$4
  local format=$5

  if [ "$case_insensitive_mode" = yes ]; then
    sed_case_insensitive_option="i"
    grep_case_insensitive_option="-i"
  fi
  [ -n "$format" ] || format="$default_format"
  # Check sanity of the input
  [ $# -ge "3" ] || { echo "Usage: replace_or_append &lt;config_file_location&gt; &lt;key_to_search&gt; &lt;new_value&gt; [&lt;CCE number or literal '@CCENUM@' if unknown&gt;] [printf-like format, default is '$default_format']" &gt;&amp;2; exit 1; }

  # Test if the config_file is a symbolic link. If so, use --follow-symlinks with sed.
  # Otherwise, regular sed command will do.
  sed_command=('sed' '-i')
  if test -L "$config_file"; then
    sed_command+=('--follow-symlinks')
  fi

  # Test that the cce arg is not empty or does not equal @CCENUM@.
  # If @CCENUM@ exists, it means that there is no CCE assigned.
  if [ -n "$cce" ] &amp;&amp; [ "$cce" != '@CCENUM@' ]; then
    cce="CCE-${cce}"
  else
    cce="CCE"
  fi

  # Strip any search characters in the key arg so that the key can be replaced without
  # adding any search characters to the config file.
  stripped_key=$(sed 's/[\^=\$,;+]*//g' &lt;&lt;&lt; "$key")

  # shellcheck disable=SC2059
  printf -v formatted_output "$format" "$stripped_key" "$value"

  # If the key exists, change it. Otherwise, add it to the config_file.
  # We search for the key string followed by a word boundary (matched by \&gt;),
  # so if we search for 'setting', 'setting2' won't match.
  if LC_ALL=C grep -q -m 1 $grep_case_insensitive_option -e "${key}\\&gt;" "$config_file"; then
    "${sed_command[@]}" "s/${key}\\&gt;.*/$formatted_output/g$sed_case_insensitive_option" "$config_file"
  else
    # \n is precaution for case where file ends without trailing newline
    printf '\n# Per %s: Set %s in %s\n' "$cce" "$formatted_output" "$config_file" &gt;&gt; "$config_file"
    printf '%s\n' "$formatted_output" &gt;&gt; "$config_file"
  fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_service_command" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function service_command</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to enable/disable and start/stop services on RHEL and Fedora systems.
#
# Example Call(s):
#
#     service_command enable bluetooth
#     service_command disable bluetooth.service
#
#     Using xinetd:
#     service_command disable rsh.socket xinetd=rsh
#
function service_command {

# Load function arguments into local variables
local service_state=$1
local service=$2
local xinetd=$(echo $3 | cut -d'=' -f2)

# Check sanity of the input
if [ $# -lt "2" ]
then
  echo "Usage: service_command 'enable/disable' 'service_name.service'"
  echo
  echo "To enable or disable xinetd services add \'xinetd=service_name\'"
  echo "as the last argument"  
  echo "Aborting."
  exit 1
fi

# If systemctl is installed, use systemctl command; otherwise, use the service/chkconfig commands
if [ -f "/usr/bin/systemctl" ] ; then
  service_util="/usr/bin/systemctl"
else
  service_util="/sbin/service"
  chkconfig_util="/sbin/chkconfig"
fi

# If disable is not specified in arg1, set variables to enable services.
# Otherwise, variables are to be set to disable services.
if [ "$service_state" != 'disable' ] ; then
  service_state="enable"
  service_operation="start"
  chkconfig_state="on"
else
  service_state="disable"
  service_operation="stop"
  chkconfig_state="off"
fi

# If chkconfig_util is not empty, use chkconfig/service commands.
if [ "x$chkconfig_util" != x ] ; then
  $service_util $service $service_operation
  $chkconfig_util --level 0123456 $service $chkconfig_state
else
  $service_util $service_operation $service
  $service_util $service_state $service
  # The service may not be running because it has been started and failed,
  # so let's reset the state so OVAL checks pass.
  # Service should be 'inactive', not 'failed' after reboot though.
  $service_util reset-failed $service
fi

# Test if local variable xinetd is empty using non-bashism.
# If empty, then xinetd is not being used.
if [ "x$xinetd" != x ] ; then
  grep -qi disable /etc/xinetd.d/$xinetd &amp;&amp; \

  if [ "$service_operation" = 'disable' ] ; then
    sed -i "s/disable.*/disable         = no/gI" /etc/xinetd.d/$xinetd
  else
    sed -i "s/disable.*/disable         = yes/gI" /etc/xinetd.d/$xinetd
  fi
fi

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_set_faillock_option_to_value_in_pam_file" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function set_faillock_option_to_value_in_pam_file</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function set_faillock_option_to_value_in_pam_file {
	# If invoked with no arguments, exit. This is an intentional behavior.
	[ $# -gt 1 ] || return 0
	[ $# -ge 3 ] || die "$0 requires exactly zero, three, or four arguments"
	[ $# -le 4 ] || die "$0 requires exactly zero, three, or four arguments"
	local _pamFile="$1" _option="$2" _value="$3" _insert_lines_callback="$4"
	# pam_faillock.so already present?
	if grep -q "^auth.*pam_faillock.so.*" "$_pamFile"; then

		# pam_faillock.so present, is the option present?
		if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*$_option=" "$_pamFile"; then

			# both pam_faillock.so &amp; option present, just correct option to the right value
			sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\($_option *= *\).*/\1\2$_value/" "$_pamFile"
			sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\($_option *= *\).*/\1\2$_value/" "$_pamFile"

		# pam_faillock.so present, but the option not yet
		else

			# append correct option value to appropriate places
			sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ $_option=$_value/" "$_pamFile"
			sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ $_option=$_value/" "$_pamFile"
		fi

	# pam_faillock.so not present yet
	else
		test -z "$_insert_lines_callback" || "$_insert_lines_callback" "$_option" "$_value" "$_pamFile"
		# insert pam_faillock.so preauth &amp; authfail rows with proper value of the option in question
	fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_package_remove" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function package_remove</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to remove packages on RHEL, Fedora, Debian, SLE, OpenSUSE, and possibly other systems.
#
# Example Call(s):
#
#     package_remove telnet-server
#
function package_remove {

# Load function arguments into local variables
local package="$1"

# Check sanity of the input
if [ $# -ne "1" ]
then
  echo "Usage: package_remove 'package_name'"
  echo "Aborting."
  exit 1
fi

if which dnf ; then
  if rpm -q --quiet "$package"; then
    dnf remove -y "$package"
  fi
elif which yum ; then
  if rpm -q --quiet "$package"; then
    yum remove -y "$package"
  fi
elif which apt-get ; then
  apt-get remove -y "$package"
elif which apt-get ; then
  zypper remove -y "$package"
else
  echo "Failed to detect available packaging system, tried dnf, yum, apt-get and zypper!"
  echo "Aborting."
  exit 1
fi

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_package_install" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function package_install</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to install packages on RHEL, Fedora, Debian, SLE, OpenSUSE, and possibly other systems.
#
# Example Call(s):
#
#     package_install aide
#
function package_install {

# Load function arguments into local variables
local package="$1"

# Check sanity of the input
if [ $# -ne "1" ]
then
  echo "Usage: package_install 'package_name'"
  echo "Aborting."
  exit 1
fi

if which dnf ; then
  if ! rpm -q --quiet "$package"; then
    dnf install -y "$package"
  fi
elif which yum ; then
  if ! rpm -q --quiet "$package"; then
    yum install -y "$package"
  fi
elif which apt-get ; then
  apt-get install -y "$package"
elif which zypper ; then
  zypper install -y "$package"
else
  echo "Failed to detect available packaging system, tried dnf, yum, apt-get and zypper!"
  echo "Aborting."
  exit 1
fi

}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_include_dconf_settings" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function include_dconf_settings</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function include_dconf_settings {
	:
}

# Function to configure DConf settings for RHEL and Fedora systems.
#
# Example Call(s):
#
#     dconf_settings 'org/gnome/login-screen' 'banner-message-enable' 'true' 'local.d' '10-banner'
#
function dconf_settings {
	local _path=$1 _key=$2 _value=$3 _db=$4 _settingFile=$5

	# Check sanity of the input
	if [ $# -ne "5" ]
	then
		echo "Usage: dconf_settings 'dconf_path' 'dconf_setting' 'dconf_db' 'dconf_settingsfile'"
		echo "Aborting."
		exit 1
	fi

	# Check for setting in any of the DConf db directories
	SETTINGSFILES=($(grep -r "\[${_path}]" "/etc/dconf/db/" | grep -v "distro\|ibus" | cut -d":" -f1))
	DCONFFILE="/etc/dconf/db/${_db}/${_settingFile}"
	DBDIR="/etc/dconf/db/${_db}"

	mkdir -p "${DBDIR}"

	if [[ -z "${SETTINGSFILES[@]}" ]]
	then
		[ ! -z ${DCONFFILE} ] || $(echo "" &gt;&gt; ${DCONFFILE})
		echo "[${_path}]" &gt;&gt; ${DCONFFILE}
		echo "${_key}=${_value}" &gt;&gt; ${DCONFFILE}
	else
		if grep -q "^${_key}" ${SETTINGSFILES[@]}
		then
			sed -i "s/${_key}\s*=\s*.*/${_key}=${_value}/g" ${SETTINGSFILES[@]}
		else
			sed -i "\|\[${_path}]|a\\${_key}=${_value}" ${SETTINGSFILES[@]}
		fi
	fi

	dconf update
}

# Function to configure DConf locks for RHEL and Fedora systems.
#
# Example Call(s):
#
#     dconf_lock 'org/gnome/login-screen' 'banner-message-enable' 'local.d' 'banner'
#
function dconf_lock {
	local _key=$1 _setting=$2 _db=$3 _lockFile=$4

	# Check sanity of the input
	if [ $# -ne "4" ]
	then
		echo "Usage: dconf_lock 'dconf_path' 'dconf_setting' 'dconf_db' 'dconf_lockfile'"
		echo "Aborting."
		exit 1
	fi

	# Check for setting in any of the DConf db directories
	LOCKFILES=$(grep -r "^/${_key}/${_setting}$" "/etc/dconf/db/" | grep -v "distro\|ibus" | cut -d":" -f1)
	LOCKSFOLDER="/etc/dconf/db/${_db}/locks"

	mkdir -p "${LOCKSFOLDER}"

	if [[ -z "${LOCKFILES}" ]]
	then
		echo "/${_key}/${_setting}" &gt;&gt; "/etc/dconf/db/${_db}/locks/${_lockFile}"
	fi
}

</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_include_merge_files_by_lines" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function include_merge_files_by_lines</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function include_merge_files_by_lines {
	:
}

# 1: Filename of the "master" file
# 2: Filename of the newly created file
function create_empty_file_like {
	local lines_count
	lines_count=$(cat "$1" | wc -l)
	for _ in $(seq 1 "$lines_count"); do
		printf '\n' &gt;&gt; "$2"
	done
}


# 1: Filename of the "master" file
# 2: Filename of sample flie
function second_file_is_same_except_newlines {
	local lines_of_master lines_of_sample len_of_master line_number i
	readarray -t lines_of_master &lt; "$1"
	readarray -t lines_of_sample &lt; "$2"

	len_of_master="${#lines_of_master[@]}"
	if test "$len_of_master" != "${#lines_of_sample[@]}"; then
		echo "Files '$1' and '$2' have different number of lines, $len_of_master and ${#lines_of_sample[@]} respectively."
		return 1
	fi

	for line_number in $(seq 1 "$len_of_master"); do
		i=$((line_number - 1))
		test -n "${lines_of_sample[$i]}" || continue
		if test "${lines_of_master[$i]}" != "${lines_of_sample[$i]}"; then
			echo "Line $line_number is different in files '$1' and '$2'."
			return 1
		fi
	done
}


# 1: Filename of the "master" file
# 2: Filename of sample flie
# 3: List of indices (1-based, space-separated string)
function merge_first_lines_to_second_on_indices {
	local lines_of_master lines_of_sample line_number i
	test -f "$2" || create_empty_file_like "$1" "$2"

	readarray -t lines_of_master &lt; "$1"
	readarray -t lines_of_sample &lt; "$2"

	error_msg="$(second_file_is_same_except_newlines "$1" "$2")"
	if test $? != 0; then
		echo "Error merging lines into '$2': $error_msg" &gt;&amp;2
		return 1
	fi

	for line_number in $3; do
		i=$((line_number - 1))
		lines_of_sample[$i]="${lines_of_master[$i]}"
	done

	printf "%s\n" "${lines_of_sample[@]}" &gt; "$2"
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function fix_audit_watch_rule</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to fix audit file system object watch rule for given path:
# * if rule exists, also verifies the -w bits match the requirements
# * if rule doesn't exist yet, appends expected rule form to $files_to_inspect
#   audit rules file, depending on the tool which was used to load audit rules
#
# Expects four arguments (each of them is required) in the form of:
# * audit tool				tool used to load audit rules,
# 					either 'auditctl', or 'augenrules'
# * path                        	value of -w audit rule's argument
# * required access bits        	value of -p audit rule's argument
# * key                         	value of -k audit rule's argument
#
# Example call:
#
#       fix_audit_watch_rule "auditctl" "/etc/localtime" "wa" "audit_time_rules"
#
function fix_audit_watch_rule {

# Load function arguments into local variables
local tool="$1"
local path="$2"
local required_access_bits="$3"
local key="$4"

# Check sanity of the input
if [ $# -ne "4" ]
then
	echo "Usage: fix_audit_watch_rule 'tool' 'path' 'bits' 'key'"
	echo "Aborting."
	exit 1
fi

# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules	| Rule already defined	|  Audit rules file to inspect	  |
# -----------------------------------------------------------------------------------------
#	auditctl		|     Doesn't matter	|  /etc/audit/audit.rules	  |
# -----------------------------------------------------------------------------------------
# 	augenrules		|          Yes		|  /etc/audit/rules.d/*.rules	  |
# 	augenrules		|          No		|  /etc/audit/rules.d/$key.rules  |
# -----------------------------------------------------------------------------------------
declare -a files_to_inspect

# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] &amp;&amp; [ "$tool" != 'augenrules' ]
then
	echo "Unknown audit rules loading tool: $1. Aborting."
	echo "Use either 'auditctl' or 'augenrules'!"
	exit 1
# If the audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# into the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
	files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules')
# If the audit is 'augenrules', then check if rule is already defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to list of files for inspection.
# If rule isn't defined, add '/etc/audit/rules.d/$key.rules' to list of files for inspection.
elif [ "$tool" == 'augenrules' ]
then
	# Backup IFS value
	IFS_BKP="$IFS"
	# Case when particular audit rule is already defined in some of /etc/audit/rules.d/*.rules file
	# Get pair -- filepath : matching_row into @matches array
	IFS=$'\n'
	matches=($(grep -P "[\s]*-w[\s]+$path" /etc/audit/rules.d/*.rules))
	# Reset IFS back to default
	IFS="$IFS_BKP"

	# For each of the matched entries
	for match in "${matches[@]}"
	do
		# Extract filepath from the match
		rulesd_audit_file=$(echo $match | cut -f1 -d ':')
		# Append that path into list of files for inspection
		files_to_inspect=("${files_to_inspect[@]}" "$rulesd_audit_file")
	done
	# Case when particular audit rule isn't defined yet
	if [ ${#files_to_inspect[@]} -eq "0" ]
	then
		# Append '/etc/audit/rules.d/$key.rules' into list of files for inspection
		files_to_inspect="/etc/audit/rules.d/$key.rules"
		# If the $key.rules file doesn't exist yet, create it with correct permissions
		if [ ! -e "$files_to_inspect" ]
		then
			touch "$files_to_inspect"
			chmod 0640 "$files_to_inspect"
		fi
	fi
fi

# Finally perform the inspection and possible subsequent audit rule
# correction for each of the files previously identified for inspection
for audit_rules_file in "${files_to_inspect[@]}"
do

	# Check if audit watch file system object rule for given path already present
	if grep -q -P -- "^[\s]*-w[\s]+$path" "$audit_rules_file"
	then
		# Rule is found =&gt; verify yet if existing rule definition contains
		# all of the required access type bits

		# Escape slashes in path for use in sed pattern below
		local esc_path=${path//$'/'/$'\/'}
		# Define BRE whitespace class shortcut
		local sp="[[:space:]]"
		# Extract current permission access types (e.g. -p [r|w|x|a] values) from audit rule
		current_access_bits=$(sed -ne "s/$sp*-w$sp\+$esc_path$sp\+-p$sp\+\([rxwa]\{1,4\}\).*/\1/p" "$audit_rules_file")
		# Split required access bits string into characters array
		# (to check bit's presence for one bit at a time)
		for access_bit in $(echo "$required_access_bits" | grep -o .)
		do
			# For each from the required access bits (e.g. 'w', 'a') check
			# if they are already present in current access bits for rule.
			# If not, append that bit at the end
			if ! grep -q "$access_bit" &lt;&lt;&lt; "$current_access_bits"
			then
				# Concatenate the existing mask with the missing bit
				current_access_bits="$current_access_bits$access_bit"
			fi
		done
		# Propagate the updated rule's access bits (original + the required
		# ones) back into the /etc/audit/audit.rules file for that rule
		sed -i "s/\($sp*-w$sp\+$esc_path$sp\+-p$sp\+\)\([rxwa]\{1,4\}\)\(.*\)/\1$current_access_bits\3/" "$audit_rules_file"
	else
		# Rule isn't present yet. Append it at the end of $audit_rules_file file
		# with proper key

		echo "-w $path -p $required_access_bits -k $key" &gt;&gt; "$audit_rules_file"
	fi
done
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_create_audit_remediation_unsuccessful_file_modification_detailed" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function create_audit_remediation_unsuccessful_file_modification_detailed</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function create_audit_remediation_unsuccessful_file_modification_detailed {
	mkdir -p "$(dirname "$1")"
	# The - option to mark a here document limit string (&lt;&lt;-EOF) suppresses leading tabs (but not spaces) in the output.
	cat &lt;&lt;-EOF &gt; "$1"
		## This content is a section of an Audit config snapshot recommended for RHEL8 sytems that target OSPP compliance.
		## The following content has been retreived on 2019-03-11 from: https://github.com/linux-audit/audit-userspace/blob/master/rules/30-ospp-v42.rules

		## The purpose of these rules is to meet the requirements for Operating
		## System Protection Profile (OSPP)v4.2. These rules depends on having
		## 10-base-config.rules, 11-loginuid.rules, and 43-module-load.rules installed.

		## Unsuccessful file creation (open with O_CREAT)
		-a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&amp;0100 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&amp;0100 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b32 -S open -F a1&amp;0100 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S open -F a1&amp;0100 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&amp;0100 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&amp;0100 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b32 -S open -F a1&amp;0100 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S open -F a1&amp;0100 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create
		-a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-create

		## Unsuccessful file modifications (open for write or truncate)
		-a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&amp;01003 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&amp;01003 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b32 -S open -F a1&amp;01003 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S open -F a1&amp;01003 -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b32 -S openat,open_by_handle_at -F a2&amp;01003 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&amp;01003 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b32 -S open -F a1&amp;01003 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S open -F a1&amp;01003 -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b32 -S truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b32 -S truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification
		-a always,exit -F arch=b64 -S truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-modification

		## Unsuccessful file access (any other opens) This has to go last.
		-a always,exit -F arch=b32 -S open,creat,truncate,ftruncate,openat,open_by_handle_at -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-access
		-a always,exit -F arch=b64 -S open,creat,truncate,ftruncate,openat,open_by_handle_at -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-access
		-a always,exit -F arch=b32 -S open,creat,truncate,ftruncate,openat,open_by_handle_at -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-access
		-a always,exit -F arch=b64 -S open,creat,truncate,ftruncate,openat,open_by_handle_at -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=unsuccesful-access
	EOF
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_include_mount_options_functions" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function include_mount_options_functions</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function include_mount_options_functions {
	:
}

# $1: type of filesystem
# $2: new mount point option
# $3: filesystem of new mount point (used when adding new entry in fstab)
# $4: mount type of new mount point (used when adding new entry in fstab)
function ensure_mount_option_for_vfstype {
        local _vfstype="$1" _new_opt="$2" _filesystem=$3 _type=$4 _vfstype_points=()
        _vfstype_points=($(grep -E "[[:space:]]$_vfstype[[:space:]]" /etc/fstab | awk '{print $2}'))

        for _vfstype_point in "${_vfstype_points[@]}"
        do
                ensure_mount_option_in_fstab "$_vfstype_point" "$_new_opt" "$_filesystem" "$_type"
        done
}

# $1: mount point
# $2: new mount point option
# $3: filesystem of mount point (used when adding new entry in fstab)
# $4: mount type of mount point (used when adding new entry in fstab)
function ensure_mount_option_in_fstab {
	local _mount_point="$1" _new_opt="$2" _filesystem=$3 _type=$4
	local _mount_point_match_regexp="" _previous_mount_opts=""
	_mount_point_match_regexp="$(get_mount_point_regexp "$_mount_point")"

	if [ $(grep -c "$_mount_point_match_regexp" /etc/fstab ) -eq 0 ]; then
		echo "${_filesystem} ${_mount_point} ${_type} defaults,${_new_opt} 0 0" &gt;&gt; /etc/fstab
	elif [ $(grep "$_mount_point_match_regexp" /etc/fstab | grep -c "$_new_opt" ) -eq 0 ]; then
		_previous_mount_opts=$(grep "$_mount_point_match_regexp" /etc/fstab | awk '{print $4}')
		sed -i "s|\(${_mount_point_match_regexp}.*${_previous_mount_opts}\)|\1,${_new_opt}|" /etc/fstab
	fi
}

# $1: mount point
function get_mount_point_regexp {
		printf "[[:space:]]%s[[:space:]]" "$1"
}

# $1: mount point
function assert_mount_point_in_fstab {
	local _mount_point_match_regexp
	_mount_point_match_regexp="$(get_mount_point_regexp "$1")"
	grep "$_mount_point_match_regexp" -q /etc/fstab \
		|| { echo "The mount point '$1' is not even in /etc/fstab, so we can't set up mount options" &gt;&amp;2; return 1; }
}

# $1: mount point
function remove_defaults_from_fstab_if_overriden {
	local _mount_point_match_regexp
	_mount_point_match_regexp="$(get_mount_point_regexp "$1")"
	if $(grep "$_mount_point_match_regexp" /etc/fstab | grep -q "defaults,")
	then
		sed -i "s|\(${_mount_point_match_regexp}.*\)defaults,|\1|" /etc/fstab
	fi
}

# $1: mount point
function ensure_partition_is_mounted {
	local _mount_point="$1"
	mkdir -p "$_mount_point" || return 1
	if mountpoint -q "$_mount_point"; then
		mount -o remount --target "$_mount_point"
	else
		mount --target "$_mount_point"
	fi
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_perform_audit_rules_privileged_commands_remediation" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function perform_audit_rules_privileged_commands_remediation</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value># Function to perform remediation for 'audit_rules_privileged_commands' rule
#
# Expects two arguments:
#
# audit_tool		tool used to load audit rules
# 			One of 'auditctl' or 'augenrules'
#
# min_auid		Minimum original ID the user logged in with
# 			'500' for RHEL-6 and before, '1000' for RHEL-7 and after.
#
# Example Call(s):
#
#      perform_audit_rules_privileged_commands_remediation "auditctl" "500"
#      perform_audit_rules_privileged_commands_remediation "augenrules"	"1000"
#
function perform_audit_rules_privileged_commands_remediation {
#
# Load function arguments into local variables
local tool="$1"
local min_auid="$2"

# Backup IFS value
IFS_BKP="$IFS"

# Check sanity of the input
if [ $# -ne "2" ]
then
	echo "Usage: perform_audit_rules_privileged_commands_remediation 'auditctl | augenrules' '500 | 1000'"
	echo "Aborting."
	exit 1
fi

declare -a files_to_inspect=()

# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] &amp;&amp; [ "$tool" != 'augenrules' ]
then
	echo "Unknown audit rules loading tool: $1. Aborting."
	echo "Use either 'auditctl' or 'augenrules'!"
	exit 1
# If the audit tool is 'auditctl', then:
# * add '/etc/audit/audit.rules'to the list of files to be inspected,
# * specify '/etc/audit/audit.rules' as the output audit file, where
#   missing rules should be inserted
elif [ "$tool" == 'auditctl' ]
then
	files_to_inspect=("/etc/audit/audit.rules")
	output_audit_file="/etc/audit/audit.rules"
#
# If the audit tool is 'augenrules', then:
# * add '/etc/audit/rules.d/*.rules' to the list of files to be inspected
#   (split by newline),
# * specify /etc/audit/rules.d/privileged.rules' as the output file, where
#   missing rules should be inserted
elif [ "$tool" == 'augenrules' ]
then
	IFS=$'\n'
	files_to_inspect=($(find /etc/audit/rules.d -maxdepth 1 -type f -name '*.rules' -print))
	output_audit_file="/etc/audit/rules.d/privileged.rules"
fi

# Obtain the list of SUID/SGID binaries on the particular system (split by newline)
# into privileged_binaries array
IFS=$'\n'
privileged_binaries=($(find / -xdev -type f -perm -4000 -o -type f -perm -2000 2&gt;/dev/null))

# Keep list of SUID/SGID binaries that have been already handled within some previous iteration
declare -a sbinaries_to_skip=()

# For each found sbinary in privileged_binaries list
for sbinary in "${privileged_binaries[@]}"
do

	# Check if this sbinary wasn't already handled in some of the previous sbinary iterations
	# Return match only if whole sbinary definition matched (not in the case just prefix matched!!!)
	if [[ $(sed -ne "\|${sbinary}|p" &lt;&lt;&lt; "${sbinaries_to_skip[*]}") ]]
	then
		# If so, don't process it second time &amp; go to process next sbinary
		continue
	fi

	# Reset the counter of inspected files when starting to check
	# presence of existing audit rule for new sbinary
	local count_of_inspected_files=0

	# Define expected rule form for this binary
	expected_rule="-a always,exit -F path=${sbinary} -F perm=x -F auid&gt;=${min_auid} -F auid!=unset -k privileged"

	# If list of audit rules files to be inspected is empty, just add new rule and move on to next binary
	if [[ ${#files_to_inspect[@]} -eq 0 ]]; then
		echo "$expected_rule" &gt;&gt; "$output_audit_file"
		continue
	fi

	# Replace possible slash '/' character in sbinary definition so we could use it in sed expressions below
	sbinary_esc=${sbinary//$'/'/$'\/'}

	# For each audit rules file from the list of files to be inspected
	for afile in "${files_to_inspect[@]}"
	do

		# Search current audit rules file's content for match. Match criteria:
		# * existing rule is for the same SUID/SGID binary we are currently processing (but
		#   can contain multiple -F path= elements covering multiple SUID/SGID binaries)
		# * existing rule contains all arguments from expected rule form (though can contain
		#   them in arbitrary order)
	
		base_search=$(sed -e '/-a always,exit/!d' -e '/-F path='"${sbinary_esc}"'/!d'		\
				-e '/-F path=[^[:space:]]\+/!d'   -e '/-F perm=.*/!d'						\
				-e '/-F auid&gt;='"${min_auid}"'/!d' -e '/-F auid!=\(4294967295\|unset\)/!d'	\
				-e '/-k \|-F key=/!d' "$afile")

		# Increase the count of inspected files for this sbinary
		count_of_inspected_files=$((count_of_inspected_files + 1))

		# Require execute access type to be set for existing audit rule
		exec_access='x'

		# Search current audit rules file's content for presence of rule pattern for this sbinary
		if [[ $base_search ]]
		then

			# Current audit rules file already contains rule for this binary =&gt;
			# Store the exact form of found rule for this binary for further processing
			concrete_rule=$base_search

			# Select all other SUID/SGID binaries possibly also present in the found rule
			IFS=$'\n'
			handled_sbinaries=($(grep -o -e "-F path=[^[:space:]]\+" &lt;&lt;&lt; "$concrete_rule"))
			IFS=$' '
			handled_sbinaries=(${handled_sbinaries[@]//-F path=/})

			# Merge the list of such SUID/SGID binaries found in this iteration with global list ignoring duplicates
			sbinaries_to_skip=($(for i in "${sbinaries_to_skip[@]}" "${handled_sbinaries[@]}"; do echo "$i"; done | sort -du))

			# Separate concrete_rule into three sections using hash '#'
			# sign as a delimiter around rule's permission section borders
			concrete_rule="$(echo "$concrete_rule" | sed -n "s/\(.*\)\+\(-F perm=[rwax]\+\)\+/\1#\2#/p")"

			# Split concrete_rule into head, perm, and tail sections using hash '#' delimiter
			IFS=$'#'
			read -r rule_head rule_perm rule_tail &lt;&lt;&lt;  "$concrete_rule"

			# Extract already present exact access type [r|w|x|a] from rule's permission section
			access_type=${rule_perm//-F perm=/}

			# Verify current permission access type(s) for rule contain 'x' (execute) permission
			if ! grep -q "$exec_access" &lt;&lt;&lt; "$access_type"
			then

				# If not, append the 'x' (execute) permission to the existing access type bits
				access_type="$access_type$exec_access"
				# Reconstruct the permissions section for the rule
				new_rule_perm="-F perm=$access_type"
				# Update existing rule in current audit rules file with the new permission section
				sed -i "s#${rule_head}\(.*\)${rule_tail}#${rule_head}${new_rule_perm}${rule_tail}#" "$afile"

			fi

		# If the required audit rule for particular sbinary wasn't found yet, insert it under following conditions:
		#
		# * in the "auditctl" mode of operation insert particular rule each time
		#   (because in this mode there's only one file -- /etc/audit/audit.rules to be inspected for presence of this rule),
		#
		# * in the "augenrules" mode of operation insert particular rule only once and only in case we have already
		#   searched all of the files from /etc/audit/rules.d/*.rules location (since that audit rule can be defined
		#   in any of those files and if not, we want it to be inserted only once into /etc/audit/rules.d/privileged.rules file)
		#
		elif [ "$tool" == "auditctl" ] || [[ "$tool" == "augenrules" &amp;&amp; $count_of_inspected_files -eq "${#files_to_inspect[@]}" ]]
		then

			# Check if this sbinary wasn't already handled in some of the previous afile iterations
			# Return match only if whole sbinary definition matched (not in the case just prefix matched!!!)
			if [[ ! $(sed -ne "\|${sbinary}|p" &lt;&lt;&lt; "${sbinaries_to_skip[*]}") ]]
			then
				# Current audit rules file's content doesn't contain expected rule for this
				# SUID/SGID binary yet =&gt; append it
				echo "$expected_rule" &gt;&gt; "$output_audit_file"
			fi

			continue
		fi

	done

done

# Reset IFS back to default
IFS="$IFS_BKP"
}
</value>
        </Value>
        <Value id="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" hidden="true" prohibitChanges="true" operator="equals" type="string">
          <title xml:lang="en-US">Remediation function ensure_pam_module_options</title>
          <description xml:lang="en-US">Shared bash remediation function. Not intended to be changed by tailoring.</description>
          <value>function ensure_pam_module_options {
	if [ $# != 7 ] ; then
		echo "$0 requires exactly six arguments" &gt;&amp;2
		exit 1
	fi
	local _pamFile="$1" _type="$2" _control="$3" _module="$4" _option="$5" _valueRegex="$6" _defaultValue="$7"

	# make sure that we have a line like this in ${_pamFile} (additional options are left as-is):
	# ${_type} ${_control} ${_module} ${_option}=${_valueRegex}

	if ! [ -e "$_pamFile" ] ; then
		echo "$_pamFile doesn't exist" &gt;&amp;2
		exit 1
	fi

	# non-empty values need to be preceded by an equals sign
	[ -n "${_valueRegex}" ] &amp;&amp; _valueRegex="=${_valueRegex}"
	# add an equals sign to non-empty values
	[ -n "${_defaultValue}" ] &amp;&amp; _defaultValue="=${_defaultValue}"

	# fix 'type' if it's wrong
	if grep -q -P "^\\s*(?"'!'"${_type}\\s)[[:alnum:]]+\\s+[[:alnum:]]+\\s+${_module}" &lt; "${_pamFile}" ; then
		sed --follow-symlinks -i -E -e "s/^(\\s*)[[:alnum:]]+(\\s+[[:alnum:]]+\\s+${_module})/\\1${_type}\\2/" "${_pamFile}"
	fi

	# fix 'control' if it's wrong
	if grep -q -P "^\\s*${_type}\\s+(?"'!'"${_control})[[:alnum:]]+\\s+${_module}" &lt; "${_pamFile}" ; then
		sed --follow-symlinks -i -E -e "s/^(\\s*${_type}\\s+)[[:alnum:]]+(\\s+${_module})/\\1${_control}\\2/" "${_pamFile}"
	fi

	# fix the value for 'option' if one exists but does not match '_valueRegex'
    if grep -q -P "^\\s*${_type}\\s+${_control}\\s+${_module}(\\s.+)?\\s+${_option}(?"'!'"${_valueRegex}(\\s|\$))" &lt; "${_pamFile}" ; then
		sed --follow-symlinks -i -E -e "s/^(\\s*${_type}\\s+${_control}\\s+${_module}(\\s.+)?\\s)${_option}=[^[:space:]]+/\\1${_option}${_defaultValue}/" "${_pamFile}"

    # add 'option=default' if option is not set
	elif grep -q -E "^\\s*${_type}\\s+${_control}\\s+${_module}" &lt; "${_pamFile}" &amp;&amp;
         grep    -E "^\\s*${_type}\\s+${_control}\\s+${_module}" &lt; "${_pamFile}" | grep -q -E -v "\\s${_option}(=|\\s|\$)" ; then

		sed --follow-symlinks -i -E -e "s/^(\\s*${_type}\\s+${_control}\\s+${_module}[^\\n]*)/\\1 ${_option}${_defaultValue}/" "${_pamFile}"
	# add a new entry if none exists
	elif ! grep -q -P "^\\s*${_type}\\s+${_control}\\s+${_module}(\\s.+)?\\s+${_option}${_valueRegex}(\\s|\$)" &lt; "${_pamFile}" ; then
		echo "${_type} ${_control} ${_module} ${_option}${_defaultValue}" &gt;&gt; "${_pamFile}"
	fi
}
</value>
        </Value>
      </Group>
      <Group id="xccdf_org.ssgproject.content_group_intro">
        <title xml:lang="en-US">Introduction</title>
        <description xml:lang="en-US">The purpose of this guidance is to provide security configuration
recommendations and baselines for the SUSE Linux Enterprise 12 operating
system. Recommended settings for the basic operating system are provided,
as well as for many network services that the system can provide to other systems.
The guide is intended for system administrators. Readers are assumed to
possess basic system administration skills for Unix-like systems, as well
as some familiarity with the product's documentation and administration
conventions. Some instructions within this guide are complex.
All directions should be followed completely and with understanding of
their effects in order to avoid serious adverse effects on the system
and its security.</description>
        <Group id="xccdf_org.ssgproject.content_group_general-principles">
          <title xml:lang="en-US">General Principles</title>
          <description xml:lang="en-US">The following general principles motivate much of the advice in this
guide and should also influence any configuration decisions that are
not explicitly covered.</description>
          <Group id="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data">
            <title xml:lang="en-US">Encrypt Transmitted Data Whenever Possible</title>
            <description xml:lang="en-US">Data transmitted over a network, whether wired or wireless, is susceptible
to passive monitoring. Whenever practical solutions for encrypting
such data exist, they should be applied. Even if data is expected to
be transmitted only over a local network, it should still be encrypted.
Encrypting authentication data, such as passwords, is particularly
important. Networks of SUSE Linux Enterprise 12 machines can and should be configured
so that no unencrypted authentication data is ever transmitted between
machines.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_principle-least-privilege">
            <title xml:lang="en-US">Least Privilege</title>
            <description xml:lang="en-US">Grant the least privilege necessary for user accounts and software to perform tasks.
For example, <html:code xmlns:html="http://www.w3.org/1999/xhtml">sudo</html:code> can be implemented to limit authorization to super user
accounts on the system only to designated personnel. Another example is to limit
logins on server systems to only those administrators who need to log into them in
order to perform administration tasks. Using SELinux also follows the principle of
least privilege: SELinux policy can confine software to perform only actions on the
system that are specifically allowed. This can be far more restrictive than the
actions permissible by the traditional Unix permissions model.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_principle-minimize-software">
            <title xml:lang="en-US">Minimize Software to Minimize Vulnerability</title>
            <description xml:lang="en-US">The simplest way to avoid vulnerabilities in software is to avoid
installing that software. On SUSE Linux Enterprise 12,the RPM Package Manager (originally Red Hat Package Manager, abbreviated RPM)
allows for careful management of
the set of software packages installed on a system. Installed software
contributes to system vulnerability in several ways. Packages that
include setuid programs may provide local attackers a potential path to
privilege escalation. Packages that include network services may give
this opportunity to network-based attackers. Packages that include
programs which are predictably executed by local users (e.g. after
graphical login) may provide opportunities for trojan horses or other
attack code to be run undetected. The number of software packages
installed on a system can almost always be significantly pruned to include
only the software for which there is an environmental or operational need.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_principle-separate-servers">
            <title xml:lang="en-US">Run Different Network Services on Separate Systems</title>
            <description xml:lang="en-US">Whenever possible, a server should be dedicated to serving exactly one
network service. This limits the number of other services that can
be compromised in the event that an attacker is able to successfully
exploit a software flaw in one network service.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_principle-use-security-tools">
            <title xml:lang="en-US">Configure Security Tools to Improve System Robustness</title>
            <description xml:lang="en-US">Several tools exist which can be effectively used to improve a system's
resistance to and detection of unknown attacks. These tools can improve
robustness against attack at the cost of relatively little configuration
effort. In particular, this guide recommends and discusses the use of
host-based firewalling, SELinux for protection against
vulnerable services, and a logging and auditing infrastructure for
detection of problems.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_how-to-use">
          <title xml:lang="en-US">How to Use This Guide</title>
          <description xml:lang="en-US">Readers should heed the following points when using the guide.</description>
          <Group id="xccdf_org.ssgproject.content_group_intro-formatting-conventions">
            <title xml:lang="en-US">Formatting Conventions</title>
            <description xml:lang="en-US">Commands intended for shell execution, as well as configuration file text,
are featured in a <html:code xmlns:html="http://www.w3.org/1999/xhtml">monospace font</html:code>. <html:i xmlns:html="http://www.w3.org/1999/xhtml">Italics</html:i> are used
to indicate instances where the system administrator must substitute
the appropriate information into a command or configuration file.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_intro-read-sections-completely">
            <title xml:lang="en-US">Read Sections Completely and in Order</title>
            <description xml:lang="en-US">Each section may build on information and recommendations discussed in
prior sections. Each section should be read and understood completely;
instructions should never be blindly applied. Relevant discussion may
occur after instructions for an action.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_intro-reboot-required">
            <title xml:lang="en-US">Reboot Required</title>
            <description xml:lang="en-US">A system reboot is implicitly required after some actions in order to
complete the reconfiguration of the system. In many cases, the changes
will not take effect until a reboot is performed. In order to ensure
that changes are applied properly and to test functionality, always
reboot the system after applying a set of recommendations from this guide.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_intro-root-shell-assumed">
            <title xml:lang="en-US">Root Shell Environment Assumed</title>
            <description xml:lang="en-US">Most of the actions listed in this document are written with the
assumption that they will be executed by the root user running the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/bin/bash</html:code> shell. Commands preceded with a hash mark (#)
assume that the administrator will execute the commands as root, i.e.
apply the command via <html:code xmlns:html="http://www.w3.org/1999/xhtml">sudo</html:code> whenever possible, or use
<html:code xmlns:html="http://www.w3.org/1999/xhtml">su</html:code> to gain root privileges if <html:code xmlns:html="http://www.w3.org/1999/xhtml">sudo</html:code> cannot be
used. Commands which can be executed as a non-root user are are preceded
by a dollar sign ($) prompt.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_intro-test-non-production">
            <title xml:lang="en-US">Test in Non-Production Environment</title>
            <description xml:lang="en-US">This guidance should always be tested in a non-production environment
before deployment. This test environment should simulate the setup in
which the system will be deployed as closely as possible.</description>
          </Group>
        </Group>
      </Group>
      <Group id="xccdf_org.ssgproject.content_group_services">
        <title xml:lang="en-US">Services</title>
        <description xml:lang="en-US">The best protection against vulnerable software is running less software. This section describes how to review
the software which SUSE Linux Enterprise 12 installs on a system and disable software which is not needed. It
then enumerates the software packages installed on a default SUSE Linux Enterprise 12 system and provides guidance about which
ones can be safely disabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
SUSE Linux Enterprise 12 provides a convenient minimal install option that essentially installs the bare necessities for a functional
system. When building SUSE Linux Enterprise 12 systems, it is highly recommended to select the minimal packages and then build up
the system from there.</description>
        <Group id="xccdf_org.ssgproject.content_group_apt">
          <title xml:lang="en-US">APT service configuration</title>
          <description xml:lang="en-US">The apt service manage the package management and update of the whole system. Its configuration need to be properly defined to ensure efficient security updates, packages and repository authentication and proper lifecycle management.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_apt_conf_disallow_unauthenticated" selected="false" severity="unknown">
            <title xml:lang="en-US">Disable unauthenticated repositories in APT configuration</title>
            <description xml:lang="en-US">Unauthenticated repositories should not be used for updates.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R15)</reference>
            <rationale xml:lang="en-US">Repositories hosts all packages that will be intsalled on the system during update.
    If a repository is not authenticated, the associated packages can't be trusted,
    and then should not be installed localy.</rationale>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_apt_sources_list_official" selected="false" severity="unknown">
            <title xml:lang="en-US">Ensure that official distribution repositories are used</title>
            <description xml:lang="en-US">Check that official Debian repositories, including security repository, are configured in apt.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R15)</reference>
            <rationale xml:lang="en-US">The Debian distribution deliver DSA (Debian Security Announce), through the official
    Debian security repository, to correct various vulnerabilities impacting the Debian
    packages. Using the official repositories is the best way to ensure that the Debian
    updates are integrated soon enough.</rationale>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_avahi">
          <title xml:lang="en-US">Avahi Server</title>
          <description xml:lang="en-US">The Avahi daemon implements the DNS Service Discovery
and Multicast DNS protocols, which provide service and host
discovery on a network. It allows a system to automatically
identify resources on the network, such as printers or web servers.
This capability is also known as mDNSresponder and is a major part
of Zeroconf networking.</description>
          <Group id="xccdf_org.ssgproject.content_group_avahi_configuration">
            <title xml:lang="en-US">Configure Avahi if Necessary</title>
            <description xml:lang="en-US">If your system requires the Avahi daemon, its configuration can be restricted
to improve security. The Avahi daemon configuration file is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/avahi/avahi-daemon.conf</html:code>. The following security recommendations
should be applied to this file:
See the <html:code xmlns:html="http://www.w3.org/1999/xhtml">avahi-daemon.conf(5)</html:code> man page, or documentation at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.avahi.org">http://www.avahi.org</html:a>, for more detailed information
about the configuration options.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_avahi_disable_publishing" selected="false" severity="unknown">
              <title xml:lang="en-US">Disable Avahi Publishing</title>
              <description xml:lang="en-US">To prevent Avahi from publishing its records, edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/avahi/avahi-daemon.conf</html:code>
and ensure the following line appears in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">[publish]</html:code> section:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">disable-publishing=yes</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">This helps ensure that no record will be published by Avahi.</rationale>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_disable_avahi_group">
            <title xml:lang="en-US">Disable Avahi Server if Possible</title>
            <description xml:lang="en-US">Because the Avahi daemon service keeps an open network
port, it is subject to network attacks.
Disabling it can reduce the system's vulnerability to such attacks.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_base">
          <title xml:lang="en-US">Base Services</title>
          <description xml:lang="en-US">This section addresses the base services that are installed on a
SUSE Linux Enterprise 12 default installation which are not covered in other
sections. Some of these services listen on the network and
should be treated with particular discretion. Other services are local
system utilities that may or may not be extraneous. In general, system services
should be disabled if not required.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="false" severity="medium">
            <version>SLES-12-010840</version>
            <title xml:lang="en-US">Disable KDump Kernel Crash Analyzer (kdump)</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">kdump</html:code> service provides a kernel crash dump analyzer. It uses the <html:code xmlns:html="http://www.w3.org/1999/xhtml">kexec</html:code>
system call to boot a secondary kernel ("capture" kernel) following a system
crash, which can load information from the crashed kernel for analysis.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">kdump</html:code> service can be disabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl disable kdump.service</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010840</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91953r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
            <rationale xml:lang="en-US">Kernel core dumps may contain the full contents of system memory at the
time of the crash. Kernel core dumps consume a considerable amount of disk
space and may result in denial of service by exhausting the available space
on the target file system partition. Unless the system is used for kernel
development or testing, there is little need to run the kdump service.</rationale>
            <fix id="service_kdump_disabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable">
SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" stop 'kdump.service'
"$SYSTEMCTL_EXEC" disable 'kdump.service'
# Disable socket activation if we have a unit file for it
"$SYSTEMCTL_EXEC" list-unit-files | grep -q '^kdump.socket\&gt;' &amp;&amp; "$SYSTEMCTL_EXEC" disable 'kdump.socket'
# The service may not be running because it has been started and failed,
# so let's reset the state so OVAL checks pass.
# Service should be 'inactive', not 'failed' after reboot though.
"$SYSTEMCTL_EXEC" reset-failed 'kdump.service'
</fix>
            <fix id="service_kdump_disabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="disable">- name: Disable service kdump
  service:
    name: kdump
    enabled: 'no'
    state: stopped
  register: service_result
  failed_when: service_result is failed and ('Could not find the requested service'
    not in service_result.msg)
  tags:
    - service_kdump_disabled
    - medium_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-17(8)
    - NIST-800-53-CM-7
    - NIST-800-53-CM-6(b)
    - DISA-STIG-010840

- name: Disable socket of service kdump if applicable
  service:
    name: kdump.socket
    enabled: 'no'
    state: stopped
  register: socket_result
  failed_when: socket_result is failed and ('Could not find the requested service'
    not in socket_result.msg)
  tags:
    - service_kdump_disabled
    - medium_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-17(8)
    - NIST-800-53-CM-7
    - NIST-800-53-CM-6(b)
    - DISA-STIG-010840
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_kdump_disabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_cron_and_at">
          <title xml:lang="en-US">Cron and At Daemons</title>
          <description xml:lang="en-US">The cron and at services are used to allow commands to
be executed at a later time. The cron service is required by almost
all systems to perform necessary maintenance tasks, while at may or
may not be required on a given system. Both daemons should be
configured defensively.</description>
          <platform idref="cpe:/a:machine"/>
          <Rule id="xccdf_org.ssgproject.content_rule_package_cron_installed" selected="false" severity="medium">
            <title xml:lang="en-US">Install the cron service</title>
            <description xml:lang="en-US">The Cron service should be installed.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R50)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <rationale xml:lang="en-US">The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only.</rationale>
            <platform idref="cpe:/a:machine"/>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_cron_enabled" selected="false" severity="medium">
            <title xml:lang="en-US">Enable cron Service</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">crond</html:code> service is used to execute commands at
preconfigured times. It is required by almost all systems to perform necessary
maintenance tasks, such as notifying root of system activity.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">cron</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable cron.service</html:pre></description>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <rationale xml:lang="en-US">Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_cron_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_restrict_at_cron_users">
            <title xml:lang="en-US">Restrict at and cron to Authorized Users if Necessary</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/cron.allow</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/at.allow</html:code> files contain lists of
users who are allowed to use <html:code xmlns:html="http://www.w3.org/1999/xhtml">cron</html:code> and at to delay execution of
processes. If these files exist and if the corresponding files
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/cron.deny</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/at.deny</html:code> do not exist, then only users
listed in the relevant allow files can run the crontab and <html:code xmlns:html="http://www.w3.org/1999/xhtml">at</html:code> commands
to submit jobs to be run at scheduled intervals. On many systems, only the
system administrator needs the ability to schedule jobs. Note that even if a
given user is not listed in <html:code xmlns:html="http://www.w3.org/1999/xhtml">cron.allow</html:code>, cron jobs can still be run as
that user. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">cron.allow</html:code> file controls only administrative access
to the crontab command for scheduling and modifying cron jobs.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To restrict <html:code xmlns:html="http://www.w3.org/1999/xhtml">at</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">cron</html:code> to only authorized users:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>Remove the <html:code>cron.deny</html:code> file:<html:pre>$ sudo rm /etc/cron.deny</html:pre></html:li><html:li>Edit <html:code>/etc/cron.allow</html:code>, adding one line for each user allowed to use
the crontab command to create cron jobs.</html:li><html:li>Remove the <html:code>at.deny</html:code> file:<html:pre>$ sudo rm /etc/at.deny</html:pre></html:li><html:li>Edit <html:code>/etc/at.allow</html:code>, adding one line for each user allowed to use
the at command to create at jobs.</html:li></html:ul></description>
            <platform idref="cpe:/a:machine"/>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_deprecated">
          <title xml:lang="en-US">Deprecated services</title>
          <description xml:lang="en-US">Some deprecated software services impact the overall system security due to their behavior (leak of
confidentiality in network exchange, usage as uncontrolled communication channel, risk associated with the service due to its old age, etc.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_package_inetutils-telnetd_removed" selected="false" severity="high">
            <title xml:lang="en-US">Uninstall the inet-based telnet server</title>
            <description xml:lang="en-US">The inet-based telnet daemon should be uninstalled.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT007(R03)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
            <rationale xml:lang="en-US">telnet allows clear text communications, and does not protect any data transmission between client and server. Any confidential data can be listened and no integrity checking is made.</rationale>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_nis_removed" selected="false" severity="low">
            <title xml:lang="en-US">Uninstall the nis package</title>
            <description xml:lang="en-US">The support for Yellowpages should not be installed unless it is required.</description>
            <rationale xml:lang="en-US">NIS is the historical SUN service for central account management, more and more replaced by LDAP.
NIS does not support efficiently security constraints, ACL, etc. and should not be used.</rationale>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_ntpdate_removed" selected="false" severity="low">
            <title xml:lang="en-US">Uninstall the ntpdate package</title>
            <description xml:lang="en-US">ntpdate is a historical ntp synchronization client for unixes. It sould be uninstalled.</description>
            <rationale xml:lang="en-US">ntpdate is an old not security-compliant ntp client. It should be replaced by modern ntp clients such as ntpd, able to use cryptographic mechanisms integrated in NTP.</rationale>
            <fix id="package_ntpdate_removed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="disable"><sub idref="xccdf_org.ssgproject.content_value_function_package_remove" use="legacy"/>
package_remove ntpdate
</fix>
            <fix id="package_ntpdate_removed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="disable">- name: Ensure ntpdate is removed
  package:
    name: ntpdate
    state: absent
  tags:
    - package_ntpdate_removed
    - low_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
</fix>
            <fix id="package_ntpdate_removed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="disable">include remove_ntpdate

class remove_ntpdate {
  package { 'ntpdate':
    ensure =&gt; 'purged',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_ntpdate_removed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_telnetd-ssl_removed" selected="false" severity="high">
            <title xml:lang="en-US">Uninstall the ssl compliant telnet server</title>
            <description xml:lang="en-US">The telnet daemon, even with ssl support, should be uninstalled.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT007(R02)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
            <rationale xml:lang="en-US">telnet, even with ssl support, should not be installed. When remote shell is required, up-to-date ssh daemon can be used.</rationale>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_telnetd_removed" selected="false" severity="high">
            <title xml:lang="en-US">Uninstall the telnet server</title>
            <description xml:lang="en-US">The telnet daemon should be uninstalled.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT007(R03)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
            <rationale xml:lang="en-US">telnet allows clear text communications, and does not protect any data transmission between client and server. Any confidential data can be listened and no integrity checking is made.</rationale>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_dhcp">
          <title xml:lang="en-US">DHCP</title>
          <description xml:lang="en-US">The Dynamic Host Configuration Protocol (DHCP) allows
systems to request and obtain an IP address and other configuration
parameters from a server.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This guide recommends configuring networking on clients by manually editing
the appropriate files under <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig</html:code>.  Use of DHCP can make client 
systems vulnerable to compromise by rogue DHCP servers, and should be avoided 
unless necessary.  If using DHCP is necessary, however, there are best practices 
that should be followed to minimize security risk.</description>
          <Group id="xccdf_org.ssgproject.content_group_dhcp_client_configuration">
            <title xml:lang="en-US">Configure DHCP Client if Necessary</title>
            <description xml:lang="en-US">If DHCP must be used, then certain configuration changes can
minimize the amount of information it receives and applies from the network,
and thus the amount of incorrect information a rogue DHCP server could
successfully distribute.  For more information on configuring dhclient, see the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">dhclient(8)</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">dhclient.conf(5)</html:code> man pages.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_dhcp_client_restrict_options" selected="false" severity="unknown">
              <title xml:lang="en-US">Minimize the DHCP-Configured Options</title>
              <description xml:lang="en-US">Create the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dhcp/dhclient.conf</html:code>, and add an
appropriate setting for each of the ten configuration settings which can be
obtained via DHCP. For each setting, do one of the following:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the setting should <html:i xmlns:html="http://www.w3.org/1999/xhtml">not</html:i> be configured remotely by the DHCP server,
select an appropriate static value, and add the line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">supersede <html:code>setting value</html:code>;</html:pre>
If the setting should be configured remotely by the DHCP server, add the lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">request <html:code>setting</html:code>;
require <html:code>setting</html:code>;</html:pre>
For example, suppose the DHCP server should provide only the IP address itself
and the subnet mask. Then the entire file should look like:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">supersede domain-name "example.com";
supersede domain-name-servers 192.168.1.2;
supersede nis-domain "";
supersede nis-servers "";
supersede ntp-servers "ntp.example.com ";
supersede routers 192.168.1.1;
supersede time-offset -18000;
request subnet-mask;
require subnet-mask;</html:pre></description>
              <warning xml:lang="en-US" category="general">In this example, the options nis-servers and
nis-domain are set to empty strings, on the assumption that the deprecated NIS
protocol is not in use. It is necessary to supersede settings for unused
services so that they cannot be set by a hostile DHCP server. If an option is
set to an empty string, dhclient will typically not attempt to configure the
service.</warning>
              <rationale xml:lang="en-US">By default, the DHCP client program, dhclient, requests and applies
ten configuration options (in addition to the IP address) from the DHCP server.
subnet-mask, broadcast-address, time-offset, routers, domain-name,
domain-name-servers, host-name, nis-domain, nis-servers, and ntp-servers.  Many
of the options requested and applied by dhclient may be the same for every
system on a network. It is recommended that almost all configuration options be
assigned statically, and only options which must vary on a host-by-host basis
be assigned via DHCP. This limits the damage which can be done by a rogue DHCP
server.  If appropriate for your site, it is also possible to supersede the
host-name directive in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dhcp/dhclient.conf</html:code>, establishing a static
hostname for the system. However, dhclient does not use the host name option
provided by the DHCP server (instead using the value provided by a reverse DNS
lookup).</rationale>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_dhcp_server_configuration">
            <title xml:lang="en-US">Configure DHCP Server</title>
            <description xml:lang="en-US">If the system must act as a DHCP server, the configuration
information it serves should be minimized. Also, support for other protocols
and DNS-updating schemes should be explicitly disabled unless needed. The
configuration file for dhcpd is called <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dhcp/dhcpd.conf</html:code>. The file
begins with a number of global configuration options. The remainder of the file
is divided into sections, one for each block of addresses offered by dhcpd,
each of which contains configuration options specific to that address
block.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_minimize_served_info" selected="false" severity="unknown">
              <title xml:lang="en-US">Minimize Served Information</title>
              <description xml:lang="en-US">Edit /etc/dhcp/dhcpd.conf. Examine each address range section within
the file, and ensure that the following options are not defined unless there is
an operational need to provide this information via DHCP:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">option domain-name
option domain-name-servers
option nis-domain
option nis-servers
option ntp-servers
option routers
option time-offset</html:pre></description>
              <warning xml:lang="en-US" category="general">By default, the Red Hat Enterprise Linux client installation uses DHCP
to request much of the above information from the DHCP server. In particular,
domain-name, domain-name-servers, and routers are configured via DHCP.  These
settings are typically necessary for proper network functionality, but are also
usually static across systems at a given site.</warning>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">Because the configuration information provided by the DHCP server
could be maliciously provided to clients by a rogue DHCP server, the amount of
information provided via DHCP should be minimized. Remove these definitions
from the DHCP server configuration to ensure that legitimate clients do not
unnecessarily rely on DHCP for this information.</rationale>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_disabling_dhcp_client">
            <title xml:lang="en-US">Disable DHCP Client</title>
            <description xml:lang="en-US">DHCP is the default network configuration method provided by the system
installer, and common on many networks. Nevertheless, manual management
of IP addresses for systems implies a greater degree of management and
accountability for network activity.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_disabling_dhcp_server">
            <title xml:lang="en-US">Disable DHCP Server</title>
            <description xml:lang="en-US">The DHCP server <html:code xmlns:html="http://www.w3.org/1999/xhtml">dhcpd</html:code> is not installed or activated by
default. If the software was installed and activated, but the
system does not need to act as a DHCP server, it should be disabled
and removed.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_dns">
          <title xml:lang="en-US">DNS Server</title>
          <description xml:lang="en-US">Most organizations have an operational need to run at
least one nameserver. However, there are many common attacks
involving DNS server software, and this server software should
be disabled on any system
on which it is not needed.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_dns_server">
            <title xml:lang="en-US">Disable DNS Server</title>
            <description xml:lang="en-US">DNS software should be disabled on any systems which does not
need to be a nameserver. Note that the BIND DNS server software is
not installed on SUSE Linux Enterprise 12 by default. The remainder of this section
discusses secure configuration of systems which must be
nameservers.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_dns_server_isolation">
            <title xml:lang="en-US">Isolate DNS from Other Services</title>
            <description xml:lang="en-US">This section discusses mechanisms for preventing the DNS server
from interfering with other services. This is done both to protect the
remainder of the network should a nameserver be compromised, and to make direct
attacks on nameservers more difficult.</description>
            <Group id="xccdf_org.ssgproject.content_group_dns_server_chroot">
              <title xml:lang="en-US">Run DNS Software in a chroot Jail</title>
              <description xml:lang="en-US">Install the <html:code xmlns:html="http://www.w3.org/1999/xhtml">bind-chroot</html:code> package:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo yum install bind-chroot</html:pre>
Place a valid named.conf file inside the chroot jail:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo cp /etc/named.conf /var/named/chroot/etc/named.conf
$ sudo chown root:root /var/named/chroot/etc/named.conf
$ sudo chmod 644 /var/named/chroot/etc/named.conf</html:pre>
Create and populate an appropriate zone directory within the jail, based on the
options directive. If your <html:code xmlns:html="http://www.w3.org/1999/xhtml">named.conf</html:code> includes:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">options {
directory "/path/to/DIRNAME ";
...
}</html:pre>
then copy that directory and its contents from the original zone directory:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo cp -r /path/to/DIRNAME /var/named/chroot/DIRNAME</html:pre>
Add or correct the following line within <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/named</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">ROOTDIR=/var/named/chroot</html:pre></description>
              <warning xml:lang="en-US" category="general">If you are running BIND in a chroot jail, then you
should use the jailed <html:code xmlns:html="http://www.w3.org/1999/xhtml">named.conf</html:code> as the primary nameserver
configuration file. That is, when this guide recommends editing
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/named.conf</html:code>, you should instead edit
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/named/chroot/etc/named.conf</html:code>.</warning>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_dns_server_dedicated">
              <title xml:lang="en-US">Run DNS Software on Dedicated Servers</title>
              <description xml:lang="en-US">Since DNS is
a high-risk service which must frequently be made available to the entire
Internet, it is strongly recommended that no other services be offered by
systems which act as organizational DNS servers.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_dns_server_protection">
            <title xml:lang="en-US">Protect DNS Data from Tampering or Attack</title>
            <description xml:lang="en-US">This section discusses DNS configuration options which make it
more difficult for attackers to gain access to private DNS data or to modify
DNS data.</description>
            <Group id="xccdf_org.ssgproject.content_group_dns_server_partition_with_views">
              <title xml:lang="en-US">Use Views to Partition External and Internal Information</title>
              <description xml:lang="en-US">If it is not possible to run external and internal nameservers on
separate physical systems, run BIND9 and simulate this feature using views.
Edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/named.conf</html:code>. Add or correct the following directives (where
SUBNET is the numerical IP representation of your organization in the form
xxx.xxx.xxx.xxx/xx):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">acl internal {
  SUBNET ;
  localhost;
};
view "internal-view" {
  match-clients { internal; };
  zone "." IN {
    type hint;
    file "db.cache";
  };
  zone "internal.example.com " IN {
    ...
  };
};

view "external-view" {
  match-clients { any; };
  recursion no;
  zone "example.com " IN {
    ...
  };
};</html:pre></description>
              <warning xml:lang="en-US" category="general">As shown in the example, database files which are
required for recursion, such as the root hints file, must be available to any
clients which are allowed to make recursive queries. Under typical
circumstances, this includes only the internal clients which are allowed to use
this server as a general-purpose nameserver.</warning>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external">
              <title xml:lang="en-US">Run Separate DNS Servers for External and Internal Queries</title>
              <description xml:lang="en-US">Is it possible to run external and internal nameservers on
separate systems? If so, follow the configuration guidance in this section. On
the external nameserver, edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/named.conf</html:code> to add or correct the
following directives:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">options {
  allow-query { any; };
  recursion no;
  ...
};
zone "example.com " IN {
  ...
};</html:pre>
On the internal nameserver, edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/named.conf</html:code>. Add or correct the
following directives, where SUBNET is the numerical IP representation of your
organization in the form xxx.xxx.xxx.xxx/xx:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">acl internal {
  SUBNET ;
  localhost;
};
options {
  allow-query { internal; };
  ...
};
zone "internal.example.com " IN {
  ...
};</html:pre></description>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_docker">
          <title xml:lang="en-US">Docker Service</title>
          <description xml:lang="en-US">The docker service is necessary to create containers, which are
  self-sufficient and self-contained applications using the resource
  isolation features of the kernel.</description>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_ftp">
          <title xml:lang="en-US">FTP Server</title>
          <description xml:lang="en-US">FTP is a common method for allowing remote access to
files. Like telnet, the FTP protocol is unencrypted, which means
that passwords and other data transmitted during the session can be
captured and that the session is vulnerable to hijacking.
Therefore, running the FTP server software is not recommended.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
However, there are some FTP server configurations which may
be appropriate for some environments, particularly those which
allow only read-only anonymous access as a means of downloading
data available to the public.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_vsftpd">
            <title xml:lang="en-US">Disable vsftpd if Possible</title>
            <description xml:lang="en-US">To minimize attack surface, disable vsftpd if at all
possible.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd">
            <title xml:lang="en-US">Configure vsftpd to Provide FTP Service if Necessary</title>
            <description xml:lang="en-US">The primary vsftpd configuration file is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/vsftpd.conf</html:code>, if that file exists, or
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/vsftpd/vsftpd.conf</html:code> if it does not.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_ftp_configure_firewall" selected="false" severity="unknown">
              <title xml:lang="en-US">Configure Firewalls to Protect the FTP Server</title>
              <description xml:lang="en-US">
By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code>
blocks access to the ports used by the web server.

To configure <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> to allow port 21 traffic, one must edit
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG and DROP lines for the INPUT chain:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT</html:pre>
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables-config</html:code>. Ensure that the space-separated list of modules contains
the FTP connection tracking module:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">IPTABLES_MODULES="ip_conntrack_ftp"</html:pre></description>
              <rationale xml:lang="en-US">These settings configure the firewall to allow connections to an FTP server.


The first line allows initial connections to the FTP server port.
FTP is an older protocol which is not very compatible with firewalls. During the initial FTP dialogue, the client
and server negotiate an arbitrary port to be used for data transfer. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip_conntrack_ftp</html:code>  module is used by
iptables to listen to that dialogue and allow connections to the data ports which FTP negotiates. This allows an
FTP server to operate on a system which is running a firewall.</rationale>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="false" severity="medium">
              <version>SLES-12-030010</version>
              <title xml:lang="en-US">Create Warning Banners for All FTP Users</title>
              <description xml:lang="en-US">
Edit the vsftpd configuration file, which resides at <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/vsftpd.conf</html:code>

by default. Add or correct the following configuration options:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">banner_file=/etc/issue</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030010</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92127r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
              <rationale xml:lang="en-US">This setting will cause the system greeting banner to be used for FTP connections as well.</rationale>
              <fix id="ftp_present_banner" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/vsftpd.conf' '^banner_file' '/etc/issue' '' '%s=%s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                <check-content-ref name="oval:ssg-ftp_present_banner:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-ftp_present_banner_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_ftp_restrict_users">
              <title xml:lang="en-US">Restrict the Set of Users Allowed to Access FTP</title>
              <description xml:lang="en-US">This section describes how to disable non-anonymous (password-based) FTP logins, or, if it is not possible to
do this entirely due to legacy applications, how to restrict insecure FTP login to only those users who have an
identified need for this access.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_ftp_limit_users" selected="false" severity="unknown">
                <title xml:lang="en-US">Limit Users Allowed FTP Access if Necessary</title>
                <description xml:lang="en-US">If there is a mission-critical reason for users to access their accounts via the insecure FTP protocol, limit the set of users who are allowed this access. Edit the vsftpd configuration file. Add or correct the following configuration options:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">userlist_enable=YES
userlist_file=/etc/vsftp.ftpusers
userlist_deny=NO</html:pre>
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/vsftp.ftpusers</html:code>. For each user USERNAME who should be allowed to access the system via FTP, add a line containing that user's name:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">USERNAME</html:pre>
If anonymous access is also required, add the anonymous usernames to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/vsftp.ftpusers</html:code> as well.
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">anonymous
ftp</html:pre></description>
                <rationale xml:lang="en-US">Historically, the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ftpusers</html:code> contained a list of users who were not allowed to access the system via FTP. It was used to prevent system users such as the root user from logging in via the insecure FTP protocol. However, when the configuration option <html:code xmlns:html="http://www.w3.org/1999/xhtml">userlist deny=NO</html:code> is set, vsftpd interprets ftpusers as the set of users who are allowed to login via FTP. Since it should be possible for most users to access their accounts via secure protocols, it is recommended that this setting be used, so that non-anonymous FTP access can be limited to legacy users who have been explicitly identified.</rationale>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_ftp_use_vsftpd">
            <title xml:lang="en-US">Use vsftpd to Provide FTP Service if Necessary</title>
            <description xml:lang="en-US">If your use-case requires FTP service, install and
set-up vsftpd to provide it.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_http">
          <title xml:lang="en-US">Web Server</title>
          <description xml:lang="en-US">The web server is responsible for providing access to
content via the HTTP protocol. Web servers represent a significant
security risk because:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>The HTTP port is commonly probed by malicious sources</html:li><html:li>Web server software is very complex, and includes a long
history of vulnerabilities</html:li><html:li>The HTTP protocol is unencrypted and vulnerable to passive
monitoring</html:li></html:ul>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The system's default web server software is Apache 2 and is
provided in the RPM package <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code>.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_httpd">
            <title xml:lang="en-US">Disable Apache if Possible</title>
            <description xml:lang="en-US">If Apache was installed and activated, but the system
does not need to act as a web server, then it should be disabled
and removed from the system.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_installing_httpd">
            <title xml:lang="en-US">Install Apache if Necessary</title>
            <description xml:lang="en-US">If <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> was not installed and activated, but the system
needs to act as a web server, then it should be installed on the system. Follow these
guidelines to install it defensively. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> package can be installed with
the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo yum install httpd</html:pre>
This method of installation is recommended over installing the "Web Server"
package group during the system installation process. The Web Server package
group includes many packages which are likely extraneous, while the
command-line method installs only the required <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> package itself.</description>
            <Group id="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed">
              <title xml:lang="en-US">Confirm Minimal Built-in Modules Installed</title>
              <description xml:lang="en-US">The default <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> installation minimizes the number of
modules that are compiled directly into the binary (<html:code xmlns:html="http://www.w3.org/1999/xhtml">core prefork http_core
mod_so</html:code>). This minimizes risk by limiting the capabilities allowed by the
web server.

Query the set of compiled-in modules using the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ httpd -l</html:pre>
If the number of compiled-in modules is significantly larger than the
aforementioned set, this guide recommends re-installing <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> with a
reduced configuration. Minimizing the number of modules that are compiled into
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> binary, reduces risk by limiting the capabilities allowed by
the webserver.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_securing_httpd">
            <title xml:lang="en-US">Secure Apache Configuration</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> configuration file is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/httpd/conf/httpd.conf</html:code>. Apply the recommendations in the remainder
of this section to this file.</description>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_loglevel" type="string">
              <title xml:lang="en-US">HTTPD Log Level</title>
              <description xml:lang="en-US">The setting for LogLevel in /etc/httpd/conf/httpd.conf</description>
              <value selector="alert">alert</value>
              <value selector="crit">crit</value>
              <value>warn</value>
              <value selector="emerg">emerg</value>
              <value selector="error">error</value>
              <value selector="warn">warn</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_max_keepalive_requests" type="number">
              <title xml:lang="en-US">Maximum KeepAlive Requests for HTTPD</title>
              <description xml:lang="en-US">The setting for MaxKeepAliveRequests in httpd.conf</description>
              <value selector="100">100</value>
              <value selector="1000">1000</value>
              <value selector="10000">10000</value>
              <value selector="100000">100000</value>
              <value selector="500">500</value>
              <value>100</value>
            </Value>
            <Group id="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server">
              <title xml:lang="en-US">Configure Operating System to Protect Web Server</title>
              <description xml:lang="en-US">The following configuration steps should be taken on the system which hosts the
web server, in order to provide as safe an environment as possible for the web server.</description>
              <Group id="xccdf_org.ssgproject.content_group_httpd_chroot">
                <title xml:lang="en-US">Run httpd in a chroot Jail if Practical</title>
                <description xml:lang="en-US">Running <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> inside a <html:code xmlns:html="http://www.w3.org/1999/xhtml">chroot</html:code> jail is designed to isolate the
web server process to a small section of the filesystem, limiting the damage if
it is compromised. Versions of Apache greater than 2.2.10 (such as the one
included with SUSE Linux Enterprise 12) provide the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ChrootDir</html:code> directive. To run Apache
inside a chroot jail in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/chroot/apache</html:code>, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/httpd/conf/httpd.conf</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">ChrootDir /chroot/apache</html:pre> This
necessitates placing all files required by <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> inside
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/chroot/apache</html:code> , including <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code>'s binaries, modules,
configuration files, and served web pages. The details of this configuration
are beyond the scope of this guide. This may also require additional SELinux
configuration.</description>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access">
                <title xml:lang="en-US">Restrict File and Directory Access</title>
                <description xml:lang="en-US">Minimize access to critical <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> files and directories.</description>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_configure_perl_securely">
              <title xml:lang="en-US">Configure PERL Securely</title>
              <description xml:lang="en-US">PERL (Practical Extraction and Report Language) is an interpreted language
optimized for scanning arbitrary text files, extracting information from those
text files, and printing reports based on that information. The language is
often used in shell scripting and is intended to be practical, easy to use, and
efficient means of generating interactive web pages for the user.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_configure_php_securely">
              <title xml:lang="en-US">Configure PHP Securely</title>
              <description xml:lang="en-US">PHP is a widely-used and often misconfigured server-side scripting language. It should
be used with caution, but configured appropriately when needed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Review <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/php.ini</html:code> and make the following changes if possible:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># Do not expose PHP error messages to external users
display_errors = Off

# Enable safe mode
safe_mode = On

# Only allow access to executables in isolated directory
safe_mode_exec_dir = php-required-executables-path

# Limit external access to PHP environment
safe_mode_allowed_env_vars = PHP_

# Restrict PHP information leakage
expose_php = Off

# Log all errors
log_errors = On

# Do not register globals for input data
register_globals = Off

# Minimize allowable PHP post size
post_max_size = 1K

# Ensure PHP redirects appropriately
cgi.force_redirect = 0

# Disallow uploading unless necessary
file_uploads = Off

# Disallow treatment of file requests as fopen calls
allow_url_fopen = Off

# Enable SQL safe mode
sql.safe_mode = On
</html:pre></description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_directory_restrictions">
              <title xml:lang="en-US">Directory Restrictions</title>
              <description xml:lang="en-US">The Directory tags in the web server configuration file allow finer grained access
control for a specified directory. All web directories should be configured on a
case-by-case basis, allowing access only where needed.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules">
              <title xml:lang="en-US">Minimize Web Server Loadable Modules</title>
              <description xml:lang="en-US">A default installation of <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> includes a plethora of dynamically shared objects (DSO)
that are loaded at run-time. Unlike the aforementioned compiled-in modules, a DSO can be
disabled in the configuration file by removing the corresponding LoadModule directive.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Note: A DSO only provides additional functionality if associated directives are included
in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> configuration file. It should also be noted that removing a DSO will produce
errors on <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> startup if the configuration file contains directives that apply to that
module. Refer to <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://httpd.apache.org/docs/">http://httpd.apache.org/docs/</html:a></html:code> for details on which directives
are associated with each DSO.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Following each DSO removal, the configuration can be tested with the following command
to check if everything still works:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo service httpd configtest</html:pre>
The purpose of each of the modules loaded by default will now be addressed one at a time.
If none of a module's directives are being used, remove it.</description>
              <Group id="xccdf_org.ssgproject.content_group_httpd_core_modules">
                <title xml:lang="en-US">httpd Core Modules</title>
                <description xml:lang="en-US">These modules comprise a basic subset of modules that are likely needed for base <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code>
functionality; ensure they are not commented out in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/httpd/conf/httpd.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">LoadModule auth_basic_module modules/mod_auth_basic.so
LoadModule authn_default_module modules/mod_authn_default.so
LoadModule authz_host_module modules/mod_authz_host.so
LoadModule authz_user_module modules/mod_authz_user.so
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
LoadModule authz_default_module modules/mod_authz_default.so
LoadModule log_config_module modules/mod_log_config.so
LoadModule logio_module modules/mod_logio.so
LoadModule setenvif_module modules/mod_setenvif.so
LoadModule mime_module modules/mod_mome.so
LoadModule autoindex_module modules/mod_autoindex.so
LoadModule negotiation_module modules/mod_negotiation.so
LoadModule dir_module modules/mod_dir.so
LoadModule alias_module modules/mod_alias.so</html:pre>
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.</description>
                <Group id="xccdf_org.ssgproject.content_group_httpd_basic_authentication">
                  <title xml:lang="en-US">Minimize Modules for HTTP Basic Authentication</title>
                  <description xml:lang="en-US">The following modules are necessary if this web server will provide content that will
be restricted by a password.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Authentication can be performed using local plain text password files (<html:code xmlns:html="http://www.w3.org/1999/xhtml">authn_file</html:code>),
local DBM password files (<html:code xmlns:html="http://www.w3.org/1999/xhtml">authn_dbm</html:code>) or an LDAP directory. The only module required by
the web server depends on your choice of authentication. Comment out the modules you don't
need from the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">LoadModule authn_file_module modules/mod_authn_file.so
LoadModule authn_dbm_module modules/mod_authn_dbm.so</html:pre>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">authn_alias</html:code> allows for authentication based on aliases. <html:code xmlns:html="http://www.w3.org/1999/xhtml">authn_anon</html:code>
allows anonymous authentication similar to that of anonymous ftp sites. <html:code xmlns:html="http://www.w3.org/1999/xhtml">authz_owner</html:code>
allows authorization based on file ownership. <html:code xmlns:html="http://www.w3.org/1999/xhtml">authz_dbm</html:code> allows for authorization
based on group membership if the web server is using DBM authentication.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the above functionality is unnecessary, comment out the related module:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">#LoadModule authn_alias_module modules/mod_authn_alias.so
#LoadModule authn_anon_module modules/mod_authn_anon.so
#LoadModule authz_owner_module modules/mod_authz_owner.so
#LoadModule authz_dbm_module modules/mod_authz_dbm.so</html:pre></description>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included">
                  <title xml:lang="en-US">Minimize Configuration Files Included</title>
                  <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">Include</html:code> directive directs <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> to load supplementary configuration files
from a provided path. The default configuration loads all files that end in <html:code xmlns:html="http://www.w3.org/1999/xhtml">.conf</html:code>
from the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/httpd/conf.d</html:code> directory.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To restrict excess configuration, the following line should be commented out and
replaced with <html:code xmlns:html="http://www.w3.org/1999/xhtml">Include</html:code> directives that only reference required configuration files:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">#Include conf.d/*.conf</html:pre>
If the above change was made, ensure that the SSL encryption remains loaded by
explicitly including the corresponding configuration file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Include conf.d/ssl.conf</html:pre>
If PHP is necessary, a similar alteration must be made:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Include conf.d/php.conf</html:pre>

Explicitly listing the configuration files to be loaded during web server start-up avoids
the possibility of unwanted or malicious configuration files to be automatically included as
part of the server's running configuration.</description>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_httpd_optional_components">
                  <title xml:lang="en-US">Minimize Various Optional Components</title>
                  <description xml:lang="en-US">The following modules perform very specific tasks, sometimes providing access to
just a few additional directives. If such functionality is not required (or if you
are not using these directives), comment out the associated module:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>External filtering (response passed through external program prior to client delivery)
<html:pre>#LoadModule ext_filter_module modules/mod_ext_filter.so</html:pre></html:li><html:li>User-specified Cache Control and Expiration
<html:pre>#LoadModule expires_module modules/mod_expires.so</html:pre></html:li><html:li>Compression Output Filter (provides content compression prior to client delivery)
<html:pre>#LoadModule deflate_module modules/mod_deflate.so</html:pre></html:li><html:li>HTTP Response/Request Header Customization
<html:pre>#LoadModule headers_module modules/mod_headers.so</html:pre></html:li><html:li>User activity monitoring via cookies
<html:pre>#LoadModule usertrack_module modules/mod_usertrack.so</html:pre></html:li><html:li>Dynamically configured mass virtual hosting
<html:pre>#LoadModule vhost_alias_module modules/mod_vhost_alias.so</html:pre></html:li></html:ul>
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.</description>
                </Group>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_modules_improve_security">
              <title xml:lang="en-US">Use Appropriate Modules to Improve httpd's Security</title>
              <description xml:lang="en-US">Among the modules available for <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> are several whose use may improve the
security of the web server installation. This section recommends and discusses
the deployment of security-relevant modules.</description>
              <Group id="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security">
                <title xml:lang="en-US">Deploy mod_security</title>
                <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">security</html:code> module provides an application level firewall for <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code>.
Following its installation with the base ruleset, specific configuration advice can be found at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.modsecurity.org/">http://www.modsecurity.org/</html:a> to design a policy that best matches the security needs of
the web applications. Usage of <html:code xmlns:html="http://www.w3.org/1999/xhtml">mod_security</html:code> is highly recommended for some environments,
but it should be noted this module does not ship with Red Hat Enterprise Linux itself,
and instead is provided via Extra Packages for Enterprise Linux (EPEL).
For more information on EPEL please refer to 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://fedoraproject.org/wiki/EPEL">http://fedoraproject.org/wiki/EPEL</html:a>.</description>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl">
                <title xml:lang="en-US">Deploy mod_ssl</title>
                <description xml:lang="en-US">Because HTTP is a plain text protocol, all traffic is susceptible to passive
monitoring. If there is a need for confidentiality, SSL should be configured
and enabled to encrypt content.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Note: <html:code xmlns:html="http://www.w3.org/1999/xhtml">mod_nss</html:code> is a FIPS 140-2 certified alternative to <html:code xmlns:html="http://www.w3.org/1999/xhtml">mod_ssl</html:code>.
The modules share a considerable amount of code and should be nearly identical
in functionality. If FIPS 140-2 validation is required, then <html:code xmlns:html="http://www.w3.org/1999/xhtml">mod_nss</html:code> should
be used. If it provides some feature or its greater compatibility is required,
then <html:code xmlns:html="http://www.w3.org/1999/xhtml">mod_ssl</html:code> should be used.</description>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage">
              <title xml:lang="en-US">Restrict Web Server Information Leakage</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ServerTokens</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">ServerSignature</html:code> directives determine how
much information the web server discloses about the configuration of the
system.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_secure_content">
              <title xml:lang="en-US">Configure HTTPD-Served Web Content Securely</title>
              <description xml:lang="en-US">Running <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> inside a <html:code xmlns:html="http://www.w3.org/1999/xhtml">chroot</html:code> jail is designed to isolate the
web server process to a small section of the filesystem, limiting the damage if
it is compromised. Versions of Apache greater than 2.2.10 (such as the one
included with Red Hat Enterprise Linux 7) provide the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ChrootDir</html:code> directive. To run Apache
inside a chroot jail in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/chroot/apache</html:code>, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/httpd/conf/httpd.conf</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">ChrootDir /chroot/apache</html:pre> This
necessitates placing all files required by <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code> inside
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/chroot/apache</html:code> , including <html:code xmlns:html="http://www.w3.org/1999/xhtml">httpd</html:code>'s binaries, modules,
configuration files, and served web pages. The details of this configuration
are beyond the scope of this guide. This may also require additional SELinux
configuration.</description>
              <Value id="xccdf_org.ssgproject.content_value_var_web_login_banner_text" type="string">
                <title xml:lang="en-US">Web Login Banner Verbiage</title>
                <description xml:lang="en-US">Enter an appropriate login banner for your organization. Please note that new lines must
be expressed by the '\n' character and special characters like parentheses and quotation marks must be escaped with '\'.</description>
                <value selector="dod_banners">^(You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:[\s\n]*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.[\s\n]*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.[\s\n]*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.[\s\n]*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests--not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.[\s\n]*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.|I\'ve[\s\n]+read[\s\n]+\&amp;[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreem\'t.)$</value>
                <value selector="dod_default">You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:[\s\n]*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.[\s\n]*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.[\s\n]*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.[\s\n]*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests--not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.[\s\n]*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.</value>
                <value selector="dod_short">I\'ve[\s\n]+read[\s\n]+\&amp;[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreem\'t.</value>
                <value selector="dss_odaa_default">[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.[\s\n]+This[\s\n]+is[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+and[\s\n]+related[\s\n]+equipment[\s\n]+are[\s\n]+intended[\s\n]+for[\s\n]+the[\s\n]+communication,[\s\n]+transmission,[\s\n]+processing,[\s\n]+and[\s\n]+storage[\s\n]+of[\s\n]+official[\s\n]+U.S.[\s\n]+Government[\s\n]+or[\s\n]+other[\s\n]+authorized[\s\n]+information[\s\n]+only.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times[\s\n]+to[\s\n]+ensure[\s\n]+proper[\s\n]+functioning[\s\n]+of[\s\n]+equipment[\s\n]+and[\s\n]+systems[\s\n]+including[\s\n]+security[\s\n]+devices[\s\n]+and[\s\n]+systems,[\s\n]+to[\s\n]+prevent[\s\n]+unauthorized[\s\n]+use[\s\n]+and[\s\n]+violations[\s\n]+of[\s\n]+statutes[\s\n]+and[\s\n]+security[\s\n]+regulations,[\s\n]+to[\s\n]+deter[\s\n]+criminal[\s\n]+activity,[\s\n]+and[\s\n]+for[\s\n]+other[\s\n]+similar[\s\n]+purposes.[\s\n]+Any[\s\n]+user[\s\n]+of[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+should[\s\n]+be[\s\n]+aware[\s\n]+that[\s\n]+any[\s\n]+information[\s\n]+placed[\s\n]+in[\s\n]+the[\s\n]+system[\s\n]+is[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+not[\s\n]+subject[\s\n]+to[\s\n]+any[\s\n]+expectation[\s\n]+of[\s\n]+privacy.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+violation[\s\n]+of[\s\n]+criminal[\s\n]+statutes,[\s\n]+this[\s\n]+evidence[\s\n]+and[\s\n]+any[\s\n]+other[\s\n]+related[\s\n]+information,[\s\n]+including[\s\n]+identification[\s\n]+information[\s\n]+about[\s\n]+the[\s\n]+user,[\s\n]+may[\s\n]+be[\s\n]+provided[\s\n]+to[\s\n]+law[\s\n]+enforcement[\s\n]+officials.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+reveals[\s\n]+violations[\s\n]+of[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+unauthorized[\s\n]+use,[\s\n]+employees[\s\n]+who[\s\n]+violate[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+make[\s\n]+unauthorized[\s\n]+use[\s\n]+of[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+appropriate[\s\n]+disciplinary[\s\n]+action.[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.</value>
                <value selector="usgcb_default">--[\s\n]+WARNING[\s\n]+--[\s\n]*This[\s\n]+system[\s\n]+is[\s\n]+for[\s\n]+the[\s\n]+use[\s\n]+of[\s\n]+authorized[\s\n]+users[\s\n]+only.[\s\n]+Individuals[\s\n]*using[\s\n]+this[\s\n]+computer[\s\n]+system[\s\n]+without[\s\n]+authority[\s\n]+or[\s\n]+in[\s\n]+excess[\s\n]+of[\s\n]+their[\s\n]*authority[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+having[\s\n]+all[\s\n]+their[\s\n]+activities[\s\n]+on[\s\n]+this[\s\n]+system[\s\n]*monitored[\s\n]+and[\s\n]+recorded[\s\n]+by[\s\n]+system[\s\n]+personnel.[\s\n]+Anyone[\s\n]+using[\s\n]+this[\s\n]*system[\s\n]+expressly[\s\n]+consents[\s\n]+to[\s\n]+such[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+advised[\s\n]+that[\s\n]*if[\s\n]+such[\s\n]+monitoring[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+criminal[\s\n]+activity[\s\n]*system[\s\n]+personal[\s\n]+may[\s\n]+provide[\s\n]+the[\s\n]+evidence[\s\n]+of[\s\n]+such[\s\n]+monitoring[\s\n]+to[\s\n]+law[\s\n]*enforcement[\s\n]+officials.</value>
              </Value>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules">
              <title xml:lang="en-US">Use Denial-of-Service Protection Modules</title>
              <description xml:lang="en-US">Denial-of-service attacks are difficult to detect and prevent while maintaining
acceptable access to authorized users. However, some traffic-shaping
modules can be used to address the problem. Well-known DoS protection modules include:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">mod_cband mod_bwshare mod_limitipconn mod_evasive</html:pre>
Denial-of-service prevention should be implemented for a web server if such a threat exists.
However, specific configuration details are very dependent on the environment and often best left
at the discretion of the administrator.</description>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_imap">
          <title xml:lang="en-US">IMAP and POP3 Server</title>
          <description xml:lang="en-US">Dovecot provides IMAP and POP3 services. It is not
installed by default. The project page at 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.dovecot.org">http://www.dovecot.org</html:a>
contains more detailed information about Dovecot
configuration.</description>
          <Group id="xccdf_org.ssgproject.content_group_configure_dovecot">
            <title xml:lang="en-US">Configure Dovecot if Necessary</title>
            <description xml:lang="en-US">If the system will operate as an IMAP or
POP3 server, the dovecot software should be configured securely by following
the recommendations below.</description>
            <Group id="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access">
              <title xml:lang="en-US">Allow IMAP Clients to Access the Server</title>
              <description xml:lang="en-US">
The default iptables configuration does not allow inbound access to any services.
This modification will allow remote hosts to initiate connections to the IMAP daemon,
while keeping all other ports on the server in their default protected state.
To configure <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> to allow port 143 traffic, one must edit
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG and DROP lines for the INPUT chain:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -m state --state NEW -p tcp --dport 143 -j ACCEPT</html:pre></description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl">
              <title xml:lang="en-US">Enable SSL Support</title>
              <description xml:lang="en-US">SSL should be used to encrypt network traffic between the 
Dovecot server and its clients. Users must authenticate to the Dovecot 
server in order to read their mail, and passwords should never be 
transmitted in clear text. In addition, protecting mail as it is 
downloaded is a privacy measure, and clients may use SSL certificates 
to authenticate the server, preventing another system from impersonating 
the server.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols">
              <title xml:lang="en-US">Support Only the Necessary Protocols</title>
              <description xml:lang="en-US">Dovecot supports the IMAP and POP3 protocols, as well as 
SSL-protected versions of those protocols. Configure the Dovecot server 
to support only the protocols needed by your site. Edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dovecot/dovecot.conf</html:code>. 
Add or correct the following lines, replacing <html:code xmlns:html="http://www.w3.org/1999/xhtml">PROTOCOL</html:code> with 
only the subset of protocols (<html:code xmlns:html="http://www.w3.org/1999/xhtml">imap</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">imaps</html:code>, 
<html:code xmlns:html="http://www.w3.org/1999/xhtml">pop3</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">pop3s</html:code>) required:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">protocols = PROTOCOL</html:pre>
If possible, require SSL protection for all transactions. The SSL 
protocol variants listen on alternate ports (995 instead of 110 for 
pop3s, and 993 instead of 143 for imaps), and require SSL-aware clients. 
An alternate approach is to listen on the standard port and require the 
client to use the STARTTLS command before authenticating.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_disabling_dovecot">
            <title xml:lang="en-US">Disable Dovecot</title>
            <description xml:lang="en-US">If the system does not need to operate as an IMAP or
POP3 server, the dovecot software should be disabled and removed.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_ldap">
          <title xml:lang="en-US">LDAP</title>
          <description xml:lang="en-US">LDAP is a popular directory service, that is, a
standardized way of looking up information from a central database.
SUSE Linux Enterprise 12 includes software that enables a system to act as both
an LDAP client and server.</description>
          <Group id="xccdf_org.ssgproject.content_group_openldap_client">
            <title xml:lang="en-US">Configure OpenLDAP Clients</title>
            <description xml:lang="en-US">This section provides information on which security settings are
important to configure in OpenLDAP clients by manually editing the appropriate
configuration files.  SUSE Linux Enterprise 12 provides an automated configuration tool called
authconfig and a graphical wrapper for authconfig called
<html:code xmlns:html="http://www.w3.org/1999/xhtml">system-config-authentication</html:code>. However, these tools do not provide as
much control over configuration as manual editing of configuration files. The
authconfig tools do not allow you to specify locations of SSL certificate
files, which is useful when trying to use SSL cleanly across several protocols.
Installation and configuration of OpenLDAP on SUSE Linux Enterprise 12 is available at</description>
            <warning xml:lang="en-US" category="general">Before configuring any system to be an
LDAP client, ensure that a working LDAP server is present on the
network.</warning>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_openldap_server">
            <title xml:lang="en-US">Configure OpenLDAP Server</title>
            <description xml:lang="en-US">This section details some security-relevant settings
for an OpenLDAP server.</description>
            <Group id="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files">
              <title xml:lang="en-US">Install and Protect LDAP Certificate Files</title>
              <description xml:lang="en-US">Create the PKI directory for LDAP certificates if it does not already exist:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo mkdir /etc/pki/tls/ldap
$ sudo chown root:root /etc/pki/tls/ldap
$ sudo chmod 755 /etc/pki/tls/ldap</html:pre>
Using removable media or some other secure transmission format, install the certificate files
onto the LDAP server:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>/etc/pki/tls/ldap/serverkey.pem</html:code>: the private key <html:code>ldapserverkey.pem</html:code></html:li><html:li><html:code>/etc/pki/tls/ldap/servercert.pem</html:code>: the certificate file <html:code>ldapservercert.pem</html:code></html:li></html:ul>
Verify the ownership and permissions of these files:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root:ldap /etc/pki/tls/ldap/serverkey.pem
$ sudo chown root:ldap /etc/pki/tls/ldap/servercert.pem
$ sudo chmod 640 /etc/pki/tls/ldap/serverkey.pem
$ sudo chmod 640 /etc/pki/tls/ldap/servercert.pem</html:pre>
Verify that the CA's public certificate file has been installed as
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pki/tls/CA/cacert.pem</html:code>, and has the correct permissions:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo mkdir /etc/pki/tls/CA
$ sudo chown root:root /etc/pki/tls/CA/cacert.pem
$ sudo chmod 644 /etc/pki/tls/CA/cacert.pem</html:pre>

As a result of these steps, the LDAP server will have access to its own private
certificate and the key with which that certificate is encrypted, and to the
public certificate file belonging to the CA. Note that it would be possible for
the key to be protected further, so that processes running as ldap could not
read it. If this were done, the LDAP server process would need to be restarted
manually whenever the server rebooted.</description>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_mail">
          <title xml:lang="en-US">Mail Server Software</title>
          <description xml:lang="en-US">Mail servers are used to send and receive email over the network.
Mail is a very common service, and Mail Transfer Agents (MTAs) are obvious
targets of network attack.
Ensure that systems are not running MTAs unnecessarily,
and configure needed MTAs as defensively as possible.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Very few systems at any site should be configured to directly receive email over the
network. Users should instead use mail client programs to retrieve email
from a central server that supports protocols such as IMAP or POP3.
However, it is normal for most systems to be independently capable of sending email,
for instance so that cron jobs can report output to an administrator.
Most MTAs, including Postfix, support a submission-only mode in which mail can be sent from
the local system to a central site MTA (or directly delivered to a local account),
but the system still cannot receive mail directly over a network.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">alternatives</html:code> program in SUSE Linux Enterprise 12 permits selection of other mail server software
(such as Sendmail), but Postfix is the default and is preferred.
Postfix was coded with security in mind and can also be more effectively contained by
SELinux as its modular design has resulted in separate processes performing specific actions.
More information is available on its website, 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.postfix.org">http://www.postfix.org</html:a>.</description>
          <platform idref="cpe:/a:machine"/>
          <Group id="xccdf_org.ssgproject.content_group_postfix_client">
            <title xml:lang="en-US">Configure SMTP For Mail Clients</title>
            <description xml:lang="en-US">This section discusses settings for Postfix in a submission-only
e-mail configuration.</description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_var_postfix_root_mail_alias" type="string">
              <title xml:lang="en-US">Postfix Root Mail Alias</title>
              <description xml:lang="en-US">Specify an email address (string) for a root mail alias.</description>
              <value>system.administrator@mail.mil</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_postfix_client_configure_mail_alias" selected="false" severity="medium">
              <version>SLES-12-020050</version>
              <title xml:lang="en-US">Configure System to Forward All Mail For The Root Account</title>
              <description xml:lang="en-US">Set up an alias for root that forwards to a monitored email address:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo echo "root: <sub idref="xccdf_org.ssgproject.content_value_var_postfix_root_mail_alias" use="legacy"/>" &gt;&gt; /etc/aliases
$ sudo newaliases</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020050</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91993r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <rationale xml:lang="en-US">A number of system services utilize email messages sent to the root user to
notify system administrators of active or impending issues.  These messages must
be forwarded to at least one monitored email address.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="postfix_client_configure_mail_alias" system="urn:xccdf:fix:script:sh">
var_postfix_root_mail_alias="<sub idref="xccdf_org.ssgproject.content_value_var_postfix_root_mail_alias" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/aliases' '^root' "$var_postfix_root_mail_alias" '' '%s: %s'

newaliases
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_postfix_root_mail_alias:var:1" value-id="xccdf_org.ssgproject.content_value_var_postfix_root_mail_alias"/>
                <check-content-ref name="oval:ssg-postfix_client_configure_mail_alias:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-postfix_client_configure_mail_alias_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_postfix_harden_os">
            <title xml:lang="en-US">Configure Operating System to Protect Mail Server</title>
            <description xml:lang="en-US">The guidance in this section is appropriate for any host which is
operating as a site MTA, whether the mail server runs using Sendmail, Postfix,
or some other software.</description>
            <platform idref="cpe:/a:machine"/>
            <Group id="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs">
              <title xml:lang="en-US">Configure SSL Certificates for Use with SMTP AUTH</title>
              <description xml:lang="en-US">If SMTP AUTH is to be used, the use of SSL to protect credentials in transit is strongly recommended.
There are also configurations for which it may be desirable to encrypt all mail in transit from one MTA to another,
though such configurations are beyond the scope of this guide. In either event, the steps for creating and installing
an SSL certificate are independent of the MTA in use, and are described here.</description>
              <platform idref="cpe:/a:machine"/>
              <Group id="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert">
                <title xml:lang="en-US">Ensure Security of Postfix SSL Certificate</title>
                <description xml:lang="en-US">Create the PKI directory for mail certificates, if it does not already exist:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo mkdir /etc/pki/tls/mail
$ sudo chown root:root /etc/pki/tls/mail
$ sudo chmod 755 /etc/pki/tls/mail</html:pre>
Using removable media or some other secure transmission format, install the files generated in the previous
step onto the mail server:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/etc/pki/tls/mail/serverkey.pem: the private key mailserverkey.pem
/etc/pki/tls/mail/servercert.pem: the certificate file mailservercert.pem</html:pre>
Verify the ownership and permissions of these files:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root:root /etc/pki/tls/mail/serverkey.pem
$ sudo chown root:root /etc/pki/tls/mail/servercert.pem
$ sudo chmod 600 /etc/pki/tls/mail/serverkey.pem
$ sudo chmod 644 /etc/pki/tls/mail/servercert.pem</html:pre>
Verify that the CA's public certificate file has been installed as <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pki/tls/CA/cacert.pem</html:code>, and has the
correct permissions:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root:root /etc/pki/tls/CA/cacert.pem
$ sudo chmod 644 /etc/pki/tls/CA/cacert.pem</html:pre></description>
                <platform idref="cpe:/a:machine"/>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_postfix_server_cfg">
              <title xml:lang="en-US">Configure Postfix if Necessary</title>
              <description xml:lang="en-US">Postfix stores its configuration files in the directory
/etc/postfix by default. The primary configuration file is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/postfix/main.cf</html:code>.</description>
              <platform idref="cpe:/a:machine"/>
              <Group id="xccdf_org.ssgproject.content_group_postfix_server_dos">
                <title xml:lang="en-US">Configure Postfix Resource Usage to Limit Denial of Service Attacks</title>
                <description xml:lang="en-US">Edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/postfix/main.cf</html:code>. Edit the following lines to
configure the amount of system resources Postfix can consume:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">default_process_limit = 100
smtpd_client_connection_count_limit = 10
smtpd_client_connection_rate_limit = 30
queue_minfree = 20971520
header_size_limit = 51200
message_size_limit = 10485760
smtpd_recipient_limit = 100</html:pre>
The values here are examples.</description>
                <warning xml:lang="en-US" category="general">Note: The values given here are examples, and may
need to be modified for any particular site. By default, the Postfix anvil
process gathers mail receipt statistics. To get information about about what
connection rates are typical at your site, look in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/maillog</html:code>
for lines with the daemon name postfix/anvil.</warning>
                <platform idref="cpe:/a:machine"/>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_postfix_server_relay">
                <title xml:lang="en-US">Control Mail Relaying</title>
                <description xml:lang="en-US">Postfix's mail relay controls are implemented with the help of the
smtpd recipient restrictions option, which controls the restrictions placed on
the SMTP dialogue once the sender and recipient envelope addresses are known.
The guidance in the following sections should be applied to all systems. If
there are systems which must be allowed to relay mail, but which cannot be
trusted to relay unconditionally, configure SMTP AUTH with SSL support.</description>
                <platform idref="cpe:/a:machine"/>
                <Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions">
                  <title xml:lang="en-US">Enact SMTP Recipient Restrictions</title>
                  <description xml:lang="en-US">To configure Postfix to restrict addresses to which it
will send mail, see:

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.postfix.org/SMTPD_ACCESS_README.html#danger">http://www.postfix.org/SMTPD_ACCESS_README.html#danger</html:a>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The full contents of <html:code xmlns:html="http://www.w3.org/1999/xhtml">smtpd_recipient_restrictions</html:code> will
vary by site, since this is a common place to put spam restrictions and other
site-specific options. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">permit_mynetworks</html:code> option allows all mail to
be relayed from the systems in <html:code xmlns:html="http://www.w3.org/1999/xhtml">mynetworks</html:code>. Then, the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">reject_unauth_destination</html:code> option denies all mail whose destination
address is not local, preventing any other systems from relaying. These two
options should always appear in this order, and should usually follow one
another immediately unless SMTP AUTH is used.</description>
                  <platform idref="cpe:/a:machine"/>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions">
                  <title xml:lang="en-US">Enact SMTP Relay Restrictions</title>
                  <description xml:lang="en-US">To configure Postfix to restrict addresses to which it
will send mail, see:

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.postfix.org/SMTPD_ACCESS_README.html#danger">http://www.postfix.org/SMTPD_ACCESS_README.html#danger</html:a>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The full contents of <html:code xmlns:html="http://www.w3.org/1999/xhtml">smtpd_recipient_restrictions</html:code> will
vary by site, since this is a common place to put spam restrictions and other
site-specific options. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">permit_mynetworks</html:code> option allows all mail to
be relayed from the systems in <html:code xmlns:html="http://www.w3.org/1999/xhtml">mynetworks</html:code>. Then, the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">reject_unauth_destination</html:code> option denies all mail whose destination
address is not local, preventing any other systems from relaying. These two
options should always appear in this order, and should usually follow one
another immediately unless SMTP AUTH is used.</description>
                  <platform idref="cpe:/a:machine"/>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_postfix_server_relay_require_tls">
                  <title xml:lang="en-US">Use TLS for SMTP AUTH</title>
                  <description xml:lang="en-US">Postfix provides options to use TLS for certificate-based
authentication and encrypted sessions. An encrypted session protects the
information that is transmitted with SMTP mail or with SASL authentication.
To configure Postfix to protect all SMTP AUTH transactions
using TLS, see 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.postfix.org/TLS_README.html">http://www.postfix.org/TLS_README.html</html:a>.</description>
                  <platform idref="cpe:/a:machine"/>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_postfix_server_relay_set_trusted">
                  <title xml:lang="en-US">Configure Trusted Networks and Hosts</title>
                  <description xml:lang="en-US">Edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/postfix/main.cf</html:code>, and configure the contents of
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">mynetworks</html:code> variable in one of the following ways:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>If any system in the subnet containing the MTA may be trusted to relay
messages, add or correct the following line:
<html:pre>mynetworks_style = subnet</html:pre>
This is also the default setting, and is in effect if all
<html:code>my_networks_style</html:code> directives are commented.</html:li><html:li>If only the MTA host itself is trusted to relay messages, add or correct
the following line:
<html:pre>mynetworks_style = host</html:pre></html:li><html:li>If the set of systems which can relay is more complicated, manually
specify an entry for each netblock or IP address which is trusted to relay by
setting the <html:code>mynetworks</html:code> variable directly:
<html:pre>mynetworks = 10.0.0.0/16, 192.168.1.0/24, 127.0.0.1</html:pre></html:li></html:ul></description>
                  <platform idref="cpe:/a:machine"/>
                </Group>
                <Group id="xccdf_org.ssgproject.content_group_postfix_server_relay_smtp_auth_for_untrusted">
                  <title xml:lang="en-US">Require SMTP AUTH Before Relaying from Untrusted Clients</title>
                  <description xml:lang="en-US">SMTP authentication allows remote clients to relay mail safely by
requiring them to authenticate before submitting mail. Postfix's SMTP AUTH uses
an authentication library called SASL, which is not part of Postfix itself.  To
enable the use of SASL authentication, see

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.postfix.org/SASL_README.html">http://www.postfix.org/SASL_README.html</html:a></description>
                  <platform idref="cpe:/a:machine"/>
                </Group>
              </Group>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_nfs_and_rpc">
          <title xml:lang="en-US">NFS and RPC</title>
          <description xml:lang="en-US">The Network File System is a popular distributed filesystem for
the Unix environment, and is very widely deployed.  This section discusses the
circumstances under which it is possible to disable NFS and its dependencies,
and then details steps which should be taken to secure
NFS's configuration. This section is relevant to systems operating as NFS
clients, as well as to those operating as NFS servers.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_nfs">
            <title xml:lang="en-US">Disable All NFS Services if Possible</title>
            <description xml:lang="en-US">If there is not a reason for the system to operate as either an
NFS client or an NFS server, follow all instructions in this section to disable
subsystems required by NFS.</description>
            <warning xml:lang="en-US" category="general">The steps in this section will prevent a system
from operating as either an NFS client or an NFS server. Only perform these
steps on systems which do not need NFS at all.</warning>
            <Group id="xccdf_org.ssgproject.content_group_disabling_netfs">
              <title xml:lang="en-US">Disable netfs if Possible</title>
              <description xml:lang="en-US">To determine if any network filesystems handled by netfs are
currently mounted on the system execute the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ mount -t nfs,nfs4,smbfs,cifs,ncpfs</html:pre>
If the command did not return any output then disable netfs.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="false" severity="unknown">
                <title xml:lang="en-US">Disable Network File Systems (netfs)</title>
                <description xml:lang="en-US">The netfs script manages the boot-time mounting of several types
of networked filesystems, of which NFS and Samba are the most common. If these
filesystem types are not in use, the script can be disabled, protecting the
system somewhat against accidental or malicious changes to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code>
and against flaws in the netfs script itself.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">netfs</html:code> service can be disabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl disable netfs.service</html:pre></description>
                <rationale xml:lang="en-US"/>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_disabling_nfs_services">
              <title xml:lang="en-US">Disable Services Used Only by NFS</title>
              <description xml:lang="en-US">If NFS is not needed, disable the NFS client daemons nfslock, rpcgssd, and rpcidmapd.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
All of these daemons run with elevated privileges, and many listen for network
connections. If they are not needed, they should be disabled to improve system
security posture.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines">
            <title xml:lang="en-US">Configure All Systems which Use NFS</title>
            <description xml:lang="en-US">The steps in this section are appropriate for all systems which
run NFS, whether they operate as clients or as servers.</description>
            <Group id="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both">
              <title xml:lang="en-US">Make Each System a Client or a Server, not Both</title>
              <description xml:lang="en-US">If NFS must be used, it should be deployed in the simplest
configuration possible to avoid maintainability problems which may lead to
unnecessary security exposure. Due to the reliability and security problems
caused by NFS (specially NFSv3 and NFSv2), it is not a good idea for systems
which act as NFS servers to also mount filesystems via NFS. At the least,
crossed mounts (the situation in which each of two servers mounts a filesystem
from the other) should never be used.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports">
              <title xml:lang="en-US">Configure NFS Services to Use Fixed Ports (NFSv3 and NFSv2)</title>
              <description xml:lang="en-US">Firewalling should be done at each host and at the border
firewalls to protect the NFS daemons from remote access, since NFS servers
should never be accessible from outside the organization. However, by default
for NFSv3 and NFSv2, the RPC Bind service assigns each NFS service to a port
dynamically at service startup time. Dynamic ports cannot be protected by port

filtering firewalls such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code>.

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Therefore, restrict each service to always use a given port, so that
firewalling can be done effectively. Note that, because of the way RPC is
implemented, it is not possible to disable the RPC Bind service even if ports
are assigned statically to all RPC services.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
In NFSv4, the mounting and locking protocols have been incorporated into the
protocol, and the server listens on the the well-known TCP port 2049. As such,
NFSv4 does not need to interact with the <html:code xmlns:html="http://www.w3.org/1999/xhtml">rpcbind, lockd, and rpc.statd</html:code>
daemons, which can and should be disabled in a pure NFSv4 environment. The
<html:code xmlns:html="http://www.w3.org/1999/xhtml">rpc.mountd</html:code> daemon is still required on the NFS server to setup
exports, but is not involved in any over-the-wire operations.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_nfs_configuring_clients">
            <title xml:lang="en-US">Configure NFS Clients</title>
            <description xml:lang="en-US">The steps in this section are appropriate for systems which operate as NFS clients.</description>
            <Group id="xccdf_org.ssgproject.content_group_disabling_nfsd">
              <title xml:lang="en-US">Disable NFS Server Daemons</title>
              <description xml:lang="en-US">There is no need to run the NFS server daemons <html:code xmlns:html="http://www.w3.org/1999/xhtml">nfs</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">rpcsvcgssd</html:code> except on a small number of properly secured systems
designated as NFS servers. Ensure that these daemons are turned off on
clients.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_mounting_remote_filesystems">
              <title xml:lang="en-US">Mount Remote Filesystems with Restrictive Options</title>
              <description xml:lang="en-US">Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code>. For each filesystem whose type
(column 3) is <html:code xmlns:html="http://www.w3.org/1999/xhtml">nfs</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">nfs4</html:code>, add the text
<html:code xmlns:html="http://www.w3.org/1999/xhtml">,nodev,nosuid</html:code> to the list of mount options in column 4. If
appropriate, also add <html:code xmlns:html="http://www.w3.org/1999/xhtml">,noexec</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
See the section titled "Restrict Partition Mount Options" for a description of
the effects of these options. In general, execution of files mounted via NFS
should be considered risky because of the possibility that an adversary could
intercept the request and substitute a malicious file. Allowing setuid files to
be executed from remote servers is particularly risky, both for this reason and
because it requires the clients to extend root-level trust to the NFS
server.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_nfs_configuring_servers">
            <title xml:lang="en-US">Configure NFS Servers</title>
            <description xml:lang="en-US">The steps in this section are appropriate for systems which operate as NFS servers.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_no_all_squash_exports" selected="false" severity="low">
              <title xml:lang="en-US">Ensure All-Squashing Disabled On All Exports</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">all_squash</html:code> maps all uids and gids to an anonymous user.
This should be disabled by removing any instances of the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">all_squash</html:code> option from the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/exports</html:code>.</description>
              <rationale xml:lang="en-US">The all_squash option maps all client requests to a single anonymous
uid/gid on the NFS server, negating the ability to track file access
by user ID.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-no_all_squash_exports_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_configure_exports_restrictively">
              <title xml:lang="en-US">Configure the Exports File Restrictively</title>
              <description xml:lang="en-US">Linux's NFS implementation uses the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/exports</html:code> to control what filesystems
and directories may be accessed via NFS. (See the <html:code xmlns:html="http://www.w3.org/1999/xhtml">exports(5)</html:code> manpage for more information about the
format of this file.)
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The syntax of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">exports</html:code> file is not necessarily checked fully on reload, and syntax errors
can leave your NFS configuration more open than intended. Therefore, exercise caution when modifying
the file.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The syntax of each line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/exports</html:code> is:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/DIR	host1(opt1,opt2) host2(opt3)</html:pre>
where <html:code xmlns:html="http://www.w3.org/1999/xhtml">/DIR</html:code> is a directory or filesystem to export, <html:code xmlns:html="http://www.w3.org/1999/xhtml">hostN</html:code> is an IP address, netblock,
hostname, domain, or netgroup to which to export, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">optN</html:code> is an option.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_export_filesystems_read_only">
              <title xml:lang="en-US">Export Filesystems Read-Only if Possible</title>
              <description xml:lang="en-US">If a filesystem is being exported so that users can view the files in a convenient
fashion, but there is no need for users to edit those files, exporting the filesystem read-only
removes an attack vector against the server. The default filesystem export mode is <html:code xmlns:html="http://www.w3.org/1999/xhtml">ro</html:code>,
so do not specify <html:code xmlns:html="http://www.w3.org/1999/xhtml">rw</html:code> without a good reason.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions">
              <title xml:lang="en-US">Use Access Lists to Enforce Authorization Restrictions</title>
              <description xml:lang="en-US">When configuring NFS exports, ensure that each export line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/exports</html:code> contains
a list of hosts which are allowed to access that export. If no hosts are specified on an export line,
then that export is available to any remote host which requests it. All lines of the exports file should
specify the hosts (or subnets, if needed) which are allowed to access the exported directory, so that
unknown or remote hosts will be denied.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Authorized hosts can be specified in several different formats:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>Name or alias that is recognized by the resolver</html:li><html:li>Fully qualified domain name</html:li><html:li>IP address</html:li><html:li>IP subnets in the format <html:code>address/netmask</html:code> or <html:code>address/CIDR</html:code></html:li></html:ul></description>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_ntp">
          <title xml:lang="en-US">Network Time Protocol</title>
          <description xml:lang="en-US">The Network Time Protocol is used to manage the system
clock over a network. Computer clocks are not very accurate, so
time will drift unpredictably on unmanaged systems. Central time
protocols can be used both to ensure that time is consistent among
a network of systems, and that their time is consistent with the
outside world.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If every system on a network reliably reports the same time, then it is much
easier to correlate log messages in case of an attack. In addition, a number of
cryptographic protocols (such as Kerberos) use timestamps to prevent certain
types of attacks. If your network does not have synchronized time, these
protocols may be unreliable or even unusable.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Depending on the specifics of the network, global time accuracy may be just as
important as local synchronization, or not very important at all. If your
network is connected to the Internet, using a public timeserver (or one
provided by your enterprise) provides globally accurate timestamps which may be
essential in investigating or responding to an attack which originated outside
of your network.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
A typical network setup involves a small number of internal systems operating
as NTP servers, and the remainder obtaining time information from those
internal servers.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
There is a choice between the daemons <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">chronyd</html:code>, which
are available from the repositories in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntp</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">chrony</html:code>
packages respectively.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The default <html:code xmlns:html="http://www.w3.org/1999/xhtml">chronyd</html:code> daemon can work well when external time references
are only intermittently accesible, can perform well even when the network is
congested for longer periods of time, can usually synchronize the clock faster
and with better time accuracy, and quickly adapts to sudden changes in the rate
of the clock, for example, due to changes in the temperature of the crystal
oscillator. <html:code xmlns:html="http://www.w3.org/1999/xhtml">Chronyd</html:code> should be considered for all systems which are
frequently suspended or otherwise intermittently disconnected and reconnected
to a network. Mobile and virtual systems for example.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> NTP daemon fully supports NTP protocol version 4 (RFC 5905),
including broadcast, multicast, manycast clients and servers, and the orphan
mode. It also supports extra authentication schemes based on public-key
cryptography (RFC 5906). The NTP daemon (<html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code>) should be considered
for systems which are normally kept permanently on. Systems which are required
to use broadcast or multicast IP, or to perform authentication of packets with
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Autokey</html:code> protocol, should consider using <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Refer to

    
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/servers/Configuring_NTP_Using_the_chrony_Suite/">https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/servers/Configuring_NTP_Using_the_chrony_Suite/</html:a>

for more detailed comparison of features of <html:code xmlns:html="http://www.w3.org/1999/xhtml">chronyd</html:code>
and <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> daemon features respectively, and for further guidance how to
choose between the two NTP daemons.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The upstream manual pages at 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://chrony.tuxfamily.org/manual.html">http://chrony.tuxfamily.org/manual.html</html:a> for
<html:code xmlns:html="http://www.w3.org/1999/xhtml">chronyd</html:code> and 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.ntp.org">http://www.ntp.org</html:a> for <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> provide additional
information on the capabilities and configuration of each of the NTP daemons.</description>
          <platform idref="cpe:/a:machine"/>
          <Value id="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll" type="number">
            <title xml:lang="en-US">Maximum NTP or Chrony Poll</title>
            <description xml:lang="en-US">The maximum NTP or Chrony poll interval number in seconds specified as a power of two.</description>
            <value selector="36_hours">17</value>
            <value>16</value>
            <value selector="system_default">16</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_var_multiple_time_servers" type="string">
            <title xml:lang="en-US">Vendor Approved Time Servers</title>
            <description xml:lang="en-US">The list of vendor-approved time servers</description>
            <value selector="fedora">0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org</value>
            <value selector="rhel">0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org</value>
            <value selector="ol">0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org</value>
            <value selector="sles">0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org</value>
            <value selector="opensuses">0.opensuse.pool.ntp.org,1.opensuse.pool.ntp.org,2.opensuse.pool.ntp.org,3.opensuse.pool.ntp.org</value>
          </Value>
          <Rule id="xccdf_org.ssgproject.content_rule_chronyd_or_ntpd_set_maxpoll" selected="false" severity="medium">
            <version>SLES-12-030300</version>
            <title xml:lang="en-US">Configure Time Service Maxpoll Interval</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">maxpoll</html:code> should be configured to
<sub idref="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll" use="legacy"/> in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ntp.conf</html:code> or
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/chrony.conf</html:code> to continuously poll time servers. To configure
<html:code xmlns:html="http://www.w3.org/1999/xhtml">maxpoll</html:code> in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ntp.conf</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/chrony.conf</html:code>
add the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">maxpoll <sub idref="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll" use="legacy"/></html:pre></description>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(a)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030300</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92171r1_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001891</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002046</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(a)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000355-GPOS-00143</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000356-GPOS-00144</reference>
            <rationale xml:lang="en-US">Inaccurate time stamps make it more difficult to correlate
events and can lead to an inaccurate analysis. Determining the correct
time a particular event occurred on a system is critical when conducting
forensic analysis and investigating system events. Sources outside the
configured acceptable allowance (drift) may be inaccurate.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="chronyd_or_ntpd_set_maxpoll" system="urn:xccdf:fix:script:sh">
var_time_service_set_maxpoll="<sub idref="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll" use="legacy"/>"

var_multiple_time_servers="<sub idref="xccdf_org.ssgproject.content_value_var_multiple_time_servers" use="legacy"/>"

if ! rpm -q ntp &gt; /dev/null &amp;&amp; ! rpm -q chrony ; then
<sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
    package_install ntp || exit 1
    systemctl enable ntpd
fi

remediated=0

config_file="/etc/ntp.conf /etc/chrony.conf"
for config_file in $config_files ; do
    [[ -f "$config_file" ]] || continue
    remediated=1

    # Set maxpoll values to var_time_service_set_maxpoll
    sed -i "s/^\(server.*maxpoll\) [0-9][0-9]*\(.*\)$/\1 $var_time_service_set_maxpoll \2/" "$config_file"


    # add time servers if none are set
    if ! grep -q '^server' "$config_file" ; then
        echo &gt;&gt; "$config_file"

        # spawn a sub-shell, to avoid modifying IFS globally
        (
            IFS=','
            for server in $var_multiple_time_servers ; do
                echo "server $server maxpoll $var_time_service_set_maxpoll" &gt;&gt; "$config_file"
            done
        )
    fi

    # Add maxpoll to server entries without maxpoll
    grep "^server" "$config_file" | grep -v maxpoll | while read -r line ; do
            sed -i "s/$line/&amp; maxpoll $var_time_service_set_maxpoll/" "$config_file"
    done

done

[[ "$remediated" = "1" ]]
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-export export-name="oval:ssg-var_time_service_set_maxpoll:var:1" value-id="xccdf_org.ssgproject.content_value_var_time_service_set_maxpoll"/>
              <check-content-ref name="oval:ssg-chronyd_or_ntpd_set_maxpoll:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-chronyd_or_ntpd_set_maxpoll_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="false" severity="unknown">
            <title xml:lang="en-US">Specify Additional Remote NTP Servers</title>
            <description xml:lang="en-US">Additional NTP servers can be specified for time synchronization
in the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ntp.conf</html:code>.  To do so, add additional lines of the
following form, substituting the IP address or hostname of a remote NTP server for
<html:em xmlns:html="http://www.w3.org/1999/xhtml">ntpserver</html:em>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">server <html:i>ntpserver</html:i></html:pre></description>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.3</reference>
            <rationale xml:lang="en-US">Specifying additional NTP servers increases the availability of
accurate time data, in the event that one of the specified servers becomes
unavailable. This is typical for a system acting as an NTP server for
other systems.</rationale>
            <platform idref="cpe:/a:machine"/>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="false" severity="medium">
            <title xml:lang="en-US">Specify a Remote NTP Server</title>
            <description xml:lang="en-US">To specify a remote NTP server for time synchronization, edit
the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ntp.conf</html:code>. Add or correct the following lines,
substituting the IP or hostname of a remote NTP server for <html:em xmlns:html="http://www.w3.org/1999/xhtml">ntpserver</html:em>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">server <html:i>ntpserver</html:i></html:pre>
This instructs the NTP software to contact that remote server to obtain time
data.</description>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.3</reference>
            <rationale xml:lang="en-US">Synchronizing with an NTP server makes it possible
to collate system logs from multiple sources or correlate computer events with
real time events.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_ntp_installed" selected="false" severity="high">
            <title xml:lang="en-US">Install the ntp service</title>
            <description xml:lang="en-US">The ntpd service should be installed.</description>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001891</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002046</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(a)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(b)</reference>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT012(R03)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000160</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000355-GPOS-00143</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000356-GPOS-00144</reference>
            <rationale xml:lang="en-US">Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_ntp_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install ntp
</fix>
            <fix id="package_ntp_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure ntp is installed
  package:
    name: ntp
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_ntp_installed
    - high_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-8(1)
    - PCI-DSS-Req-10.4
</fix>
            <fix id="package_ntp_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_ntp

class install_ntp {
  package { 'ntp':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_ntp_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_ntp_enabled" selected="false" severity="high">
            <title xml:lang="en-US">Enable the NTP Daemon</title>
            <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable ntpd.service</html:pre></description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT012(R03)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000160</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4</reference>
            <rationale xml:lang="en-US">Enabling the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> service ensures that the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code>
service will be running and that the system will synchronize its time to
any servers specified. This is important whether the system is configured to be
a client (and synchronize only its own clock) or it is also acting as an NTP
server to other systems.  Synchronizing time is essential for authentication
services such as Kerberos, but it is also important for maintaining accurate
logs and auditing possible security breaches.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The NTP daemon offers all of the functionality of <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpdate</html:code>, which is now
deprecated.  Additional information on this is available at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate">http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate</html:a>.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_ntp_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="false" severity="medium">
            <title xml:lang="en-US">Enable the NTP Daemon</title>
            <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable ntpd.service</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001891</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002046</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(a)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000355-GPOS-00143</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000356-GPOS-00144</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4</reference>
            <rationale xml:lang="en-US">Enabling the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code> service ensures that the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpd</html:code>
service will be running and that the system will synchronize its time to
any servers specified. This is important whether the system is configured to be
a client (and synchronize only its own clock) or it is also acting as an NTP
server to other systems.  Synchronizing time is essential for authentication
services such as Kerberos, but it is also important for maintaining accurate
logs and auditing possible security breaches.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The NTP daemon offers all of the functionality of <html:code xmlns:html="http://www.w3.org/1999/xhtml">ntpdate</html:code>, which is now
deprecated.  Additional information on this is available at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate">http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate</html:a>.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_ntpd_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'ntp' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'ntpd.service'
"$SYSTEMCTL_EXEC" enable 'ntpd.service'
</fix>
            <fix id="service_ntpd_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service ntpd
  service:
    name: ntpd
    enabled: 'yes'
    state: started
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_ntpd_enabled
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-8(1)
    - PCI-DSS-Req-10.4
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_ntpd_enabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_timesyncd_enabled" selected="false" severity="high">
            <title xml:lang="en-US">Enable systemd_timesyncd Service</title>
            <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">systemd_timesyncd</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable systemd_timesyncd.service</html:pre></description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT012(R03)</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000160</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4</reference>
            <rationale xml:lang="en-US">Enabling the <html:code xmlns:html="http://www.w3.org/1999/xhtml">systemd_timesyncd</html:code> service ensures that this host
uses the ntp protocol to fetch time data from a ntp server.
Synchronizing time is essential for authentication
services such as Kerberos, but it is also important for maintaining accurate
logs and auditing possible security breaches.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Additional information on Ubuntu network time protocol is
available at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://help.ubuntu.com/lts/serverguide/NTP.html.en">https://help.ubuntu.com/lts/serverguide/NTP.html.en</html:a>.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_timesyncd_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_obsolete">
          <title xml:lang="en-US">Obsolete Services</title>
          <description xml:lang="en-US">This section discusses a number of network-visible
services which have historically caused problems for system
security, and for which disabling or severely limiting the service
has been the best available guidance for some time. As a result of
this, many of these services are not installed as part of SUSE Linux Enterprise 12
by default.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Organizations which are running these services should
switch to more secure equivalents as soon as possible.
If it remains absolutely necessary to run one of
these services for legacy reasons, care should be taken to restrict
the service as much as possible, for instance by configuring host

firewall software such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> to restrict access to the

vulnerable service to only those remote hosts which have a known
need to use it.</description>
          <Group id="xccdf_org.ssgproject.content_group_inetd_and_xinetd">
            <title xml:lang="en-US">Xinetd</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">xinetd</html:code> service acts as a dedicated listener for some
network services (mostly, obsolete ones) and can be used to provide access
controls and perform some logging. It has been largely obsoleted by other
features, and it is not installed by default. The older Inetd service
is not even available as part of SUSE Linux Enterprise 12.</description>
            <platform idref="cpe:/a:machine"/>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_nis">
            <title xml:lang="en-US">NIS</title>
            <description xml:lang="en-US">The Network Information Service (NIS), also known as 'Yellow
Pages' (YP), and its successor NIS+ have been made obsolete by
Kerberos, LDAP, and other modern centralized authentication
services. NIS should not be used because it suffers from security
problems inherent in its design, such as inadequate protection of
important authentication information.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_r_services">
            <title xml:lang="en-US">Rlogin, Rsh, and Rexec</title>
            <description xml:lang="en-US">The Berkeley r-commands are legacy services which
allow cleartext remote access and have an insecure trust
model.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_no_host_based_files" selected="false" severity="high">
              <version>SLES-12-010410</version>
              <title xml:lang="en-US">Remove Host-Based Authentication Files</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">shosts.equiv</html:code> file list remote hosts
and users that are trusted by the local system.
To remove these files, run the following command to delete them from any
location:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo rm /[path]/[to]/[file]/shosts.equiv</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010410</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91835r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The shosts.equiv files are used to configure host-based authentication for the
system via SSH. Host-based authentication is not sufficient for preventing
unauthorized access to the system, as it does not require interactive
identification and authentication of a connection request, or for the use of
two-factor authentication.</rationale>
              <fix id="no_host_based_files" system="urn:xccdf:fix:script:sh">
# Identify local mounts
MOUNT_LIST=$(df --local | awk '{ print $6 }') 

# Find file on each listed mount point
for cur_mount in ${MOUNT_LIST}
do
	find ${cur_mount} -xdev -type f -name "shosts.equiv" -exec rm -f {} \;
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-no_host_based_files:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-no_host_based_files_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="false" severity="high">
              <title xml:lang="en-US">Remove Rsh Trust Files</title>
              <description xml:lang="en-US">The files <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/hosts.equiv</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">~/.rhosts</html:code> (in
each user's home directory) list remote hosts and users that are trusted by the
local system when using the rshd daemon.
To remove these files, run the following command to delete them from any
location:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo rm /etc/hosts.equiv</html:pre>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ rm ~/.rhosts</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.2.14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001436</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <rationale xml:lang="en-US">Trust files are convenient, but when
used in conjunction with the R-services, they can allow
unauthenticated access to a system.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_no_user_host_based_files" selected="false" severity="high">
              <version>SLES-12-010400</version>
              <title xml:lang="en-US">Remove User Host-Based Authentication Files</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">~/.shosts</html:code> (in each user's home directory) files
list remote hosts and users that are trusted by the
local system. To remove these files, run the following command
to delete them from any location:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo find / -name '.shosts' -type f -delete</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010400</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91833r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The .shosts files are used to configure host-based authentication for
individual users or the system via SSH. Host-based authentication is not
sufficient for preventing unauthorized access to the system, as it does not
require interactive identification and authentication of a connection request,
or for the use of two-factor authentication.</rationale>
              <fix id="no_user_host_based_files" system="urn:xccdf:fix:script:sh">
# Identify local mounts
MOUNT_LIST=$(df --local | awk '{ print $6 }') 

# Find file on each listed mount point
for cur_mount in ${MOUNT_LIST}
do
	find ${cur_mount} -xdev -type f -name ".shosts" -exec rm -f {} \;
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-no_user_host_based_files:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-no_user_host_based_files_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_talk">
            <title xml:lang="en-US">Chat/Messaging Services</title>
            <description xml:lang="en-US">The talk software makes it possible for users to send and receive messages
across systems through a terminal session.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_telnet">
            <title xml:lang="en-US">Telnet</title>
            <description xml:lang="en-US">The telnet protocol does not provide confidentiality or integrity
for information transmitted on the network. This includes authentication
information such as passwords. Organizations which use telnet should be
actively working to migrate to a more secure protocol.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="false" severity="high">
              <version>SLES-12-030000</version>
              <title xml:lang="en-US">Uninstall telnet-server Package</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">telnet-server</html:code> package can be removed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper remove telnet-server</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030000</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92125r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">2.1.1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000381</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7(a)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000095-GPOS-00049</reference>
              <rationale xml:lang="en-US">It is detrimental for operating systems to provide, or install by default,
functionality exceeding requirements or mission objectives. These
unnecessary capabilities are often overlooked and therefore may remain
unsecure. They increase the risk to the platform by providing additional
attack vectors.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The telnet service provides an unencrypted remote access service which does
not provide for the confidentiality and integrity of user passwords or the
remote session. If a privileged user were to login using this service, the
privileged user password could be compromised.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Removing the <html:code xmlns:html="http://www.w3.org/1999/xhtml">telnet-server</html:code> package decreases the risk of the
telnet service's accidental (or intentional) activation.</rationale>
              <fix id="package_telnet-server_removed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="disable"><sub idref="xccdf_org.ssgproject.content_value_function_package_remove" use="legacy"/>
package_remove telnet-server
</fix>
              <fix id="package_telnet-server_removed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="disable">- name: Ensure telnet-server is removed
  package:
    name: telnet-server
    state: absent
  tags:
    - package_telnet-server_removed
    - high_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-17(8)
    - NIST-800-53-CM-7(a)
    - DISA-STIG-030000
</fix>
              <fix id="package_telnet-server_removed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="disable">include remove_telnet-server

class remove_telnet-server {
  package { 'telnet-server':
    ensure =&gt; 'purged',
  }
}
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-package_telnet-server_removed:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_tftp">
            <title xml:lang="en-US">TFTP Server</title>
            <description xml:lang="en-US">TFTP is a lightweight version of the FTP protocol which has
traditionally been used to configure networking equipment. However,
TFTP provides little security, and modern versions of networking
operating systems frequently support configuration via SSH or other
more secure protocols. A TFTP server should be run only if no more
secure method of supporting existing equipment can be
found.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_printing">
          <title xml:lang="en-US">Print Support</title>
          <description xml:lang="en-US">The Common Unix Printing System (CUPS) service provides both local
and network printing support. A system running the CUPS service can accept
print jobs from other systems, process them, and send them to the appropriate
printer. It also provides an interface for remote administration through a web
browser. The CUPS service is installed and activated by default. The project
homepage and more detailed documentation are available at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.cups.org">http://www.cups.org</html:a>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
          <Group id="xccdf_org.ssgproject.content_group_configure_printing">
            <title xml:lang="en-US">Configure the CUPS Service if Necessary</title>
            <description xml:lang="en-US">CUPS provides the ability to easily share local printers with
other systems over the network. It does this by allowing systems to share
lists of available printers. Additionally, each system that runs the CUPS
service can potentially act as a print server. Whenever possible, the printer
sharing and print server capabilities of CUPS should be limited or disabled.
The following recommendations should demonstrate how to do just that.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_proxy">
          <title xml:lang="en-US">Proxy Server</title>
          <description xml:lang="en-US">A proxy server is a very desirable target for a
potential adversary because much (or all) sensitive data for a
given infrastructure may flow through it. Therefore, if one is
required, the system acting as a proxy server should be dedicated
to that purpose alone and be stored in a physically secure
location. The system's default proxy server software is Squid, and
provided in an RPM package of the same name.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_squid">
            <title xml:lang="en-US">Disable Squid if Possible</title>
            <description xml:lang="en-US">If Squid was installed and activated, but the system
does not need to act as a proxy server, then it should be disabled
and removed.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_routing">
          <title xml:lang="en-US">Network Routing</title>
          <description xml:lang="en-US">A router is a very desirable target for a
potential adversary because they fulfill a variety of 
infrastructure networking roles such as access to network segments,
gateways to other networks, filtering, etc. Therefore, if one is
required, the system acting as a router should be dedicated
to that purpose alone and be stored in a physically secure
location. The system's default routing software is Quagga, and
provided in an RPM package of the same name.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_quagga">
            <title xml:lang="en-US">Disable Quagga if Possible</title>
            <description xml:lang="en-US">If Quagga was installed and activated, but the system
does not need to act as a router, then it should be disabled
and removed.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_smb">
          <title xml:lang="en-US">Samba(SMB) Microsoft Windows File Sharing Server</title>
          <description xml:lang="en-US">When properly configured, the Samba service allows
Linux systems to provide file and print sharing to Microsoft
Windows systems. There are two software packages that provide
Samba support. The first, <html:code xmlns:html="http://www.w3.org/1999/xhtml">samba-client</html:code>, provides a series of
command line tools that enable a client system to access Samba
shares. The second, simply labeled <html:code xmlns:html="http://www.w3.org/1999/xhtml">samba</html:code>, provides the Samba
service. It is this second package that allows a Linux system to
act as an Active Directory server, a domain controller, or as a
domain member. Only the <html:code xmlns:html="http://www.w3.org/1999/xhtml">samba-client</html:code> package is installed by
default.</description>
          <Group id="xccdf_org.ssgproject.content_group_configuring_samba">
            <title xml:lang="en-US">Configure Samba if Necessary</title>
            <description xml:lang="en-US">All settings for the Samba daemon can be found in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/samba/smb.conf</html:code>. Settings are divided between a
<html:code xmlns:html="http://www.w3.org/1999/xhtml">[global]</html:code> configuration section and a series of user
created share definition sections meant to describe file or print
shares on the system. By default, Samba will operate in user mode
and allow client systems to access local home directories and
printers. It is recommended that these settings be changed or that
additional limitations be set in place.</description>
            <Group id="xccdf_org.ssgproject.content_group_smb_disable_printing">
              <title xml:lang="en-US">Restrict Printer Sharing</title>
              <description xml:lang="en-US">By default, Samba utilizes the CUPS printing service to enable
printer sharing with Microsoft Windows workstations. If there are no printers
on the local system, or if printer sharing with Microsoft Windows is not
required, disable the printer sharing capability by commenting out the
following lines, found in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/samba/smb.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[global]
  load printers = yes
  cups options = raw
[printers]
  comment = All Printers
  path = /usr/spool/samba
  browseable = no
  guest ok = no
  writable = no
  printable = yes</html:pre>
There may be other options present, but these are the only options enabled and
uncommented by default. Removing the <html:code xmlns:html="http://www.w3.org/1999/xhtml">[printers]</html:code> share should be enough
for most users.  If the Samba printer sharing capability is needed, consider
disabling the Samba network browsing capability or restricting access to a
particular set of users or network addresses. Set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">valid users</html:code>
parameter to a small subset of users or restrict it to a particular group of
users with the shorthand <html:code xmlns:html="http://www.w3.org/1999/xhtml">@</html:code>. Separate each user or group of users with
a space. For example, under the <html:code xmlns:html="http://www.w3.org/1999/xhtml">[printers]</html:code> share:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[printers]
  valid users = user @printerusers</html:pre></description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing">
              <title xml:lang="en-US">Restrict SMB File Sharing to Configured Networks</title>
              <description xml:lang="en-US">Only users with local user accounts will be able to log in to
Samba shares by default. Shares can be limited to particular users or network
addresses. Use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">hosts allow</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">hosts deny</html:code> directives
accordingly, and consider setting the valid users directive to a limited subset
of users or to a group of users. Separate each address, user, or user group
with a space as follows for a particular <html:i xmlns:html="http://www.w3.org/1999/xhtml">share</html:i> or global:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[<html:i>share</html:i>]
  hosts allow = 192.168.1. 127.0.0.1
  valid users = userone usertwo @usergroup</html:pre>
It is also possible to limit read and write access to particular users with the
read list and write list options, though the permissions set by the system
itself will override these settings. Set the read only attribute for each share
to ensure that global settings will not accidentally override the individual
share settings. Then, as with the valid users directive, separate each user or
group of users with a space:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[<html:i>share</html:i>]
  read only = yes
  write list = userone usertwo @usergroup</html:pre></description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_disabling_samba">
            <title xml:lang="en-US">Disable Samba if Possible</title>
            <description xml:lang="en-US">Even after the Samba server package has been installed, it
will remain disabled. Do not enable this service unless it is
absolutely necessary to provide Microsoft Windows file and print
sharing functionality.</description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_snmp">
          <title xml:lang="en-US">SNMP Server</title>
          <description xml:lang="en-US">The Simple Network Management Protocol allows
administrators to monitor the state of network devices, including
computers. Older versions of SNMP were well-known for weak
security, such as plaintext transmission of the community string
(used for authentication) and usage of easily-guessable
choices for the community string.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_snmp_service">
            <title xml:lang="en-US">Disable SNMP Server if Possible</title>
            <description xml:lang="en-US">The system includes an SNMP daemon that allows for its remote
monitoring, though it not installed by default. If it was installed and
activated but is not needed, the software should be disabled and removed.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_snmp_configure_server">
            <title xml:lang="en-US">Configure SNMP Server if Necessary</title>
            <description xml:lang="en-US">If it is necessary to run the snmpd agent on the system, some best
practices should be followed to minimize the security risk from the
installation. The multiple security models implemented by SNMP cannot be fully
covered here so only the following general configuration advice can be offered:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>use only SNMP version 3 security models and enable the use of authentication and encryption</html:li><html:li>write access to the MIB (Management Information Base) should be allowed only if necessary</html:li><html:li>all access to the MIB should be restricted following a principle of least privilege</html:li><html:li>network access should be limited to the maximum extent possible including restricting to expected network
addresses both in the configuration files and in the system firewall rules</html:li><html:li>ensure SNMP agents send traps only to, and accept SNMP queries only from, authorized management
stations</html:li><html:li>ensure that permissions on the <html:code>snmpd.conf</html:code> configuration file (by default, in <html:code>/etc/snmp</html:code>) are 640 or more restrictive</html:li><html:li>ensure that any MIB files' permissions are also 640 or more restrictive</html:li></html:ul></description>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_ssh">
          <title xml:lang="en-US">SSH Server</title>
          <description xml:lang="en-US">The SSH protocol is recommended for remote login and
remote file transfer. SSH provides confidentiality and integrity
for data exchanged between two systems, as well as server
authentication, through the use of public key cryptography. The
implementation included with the system is called OpenSSH, and more
detailed documentation is available from its website,

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.openssh.org">http://www.openssh.org</html:a>.
Its server program is called <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd</html:code> and provided by the RPM package
<html:code xmlns:html="http://www.w3.org/1999/xhtml">openssh-server</html:code>.</description>
          <platform idref="cpe:/a:machine"/>
          <Value id="xccdf_org.ssgproject.content_value_firewalld_sshd_zone" type="string">
            <title xml:lang="en-US">SSH enabled firewalld zone</title>
            <description xml:lang="en-US">Specify firewalld zone to enable SSH service. This value is used only for remediation purposes.</description>
            <value selector="block">block</value>
            <value>public</value>
            <value selector="dmz">dmz</value>
            <value selector="drop">drop</value>
            <value selector="external">external</value>
            <value selector="home">home</value>
            <value selector="internal">internal</value>
            <value selector="public">public</value>
            <value selector="trusted">trusted</value>
            <value selector="work">work</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_sshd_listening_port" type="number">
            <title xml:lang="en-US">SSH Server Listening Port</title>
            <description xml:lang="en-US">Specify port the SSH server is listening.</description>
            <value>22</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_sshd_max_auth_tries_value" type="number">
            <title xml:lang="en-US">SSH Max authentication attempts</title>
            <description xml:lang="en-US">Specify the maximum number of authentication attempts per connection.</description>
            <value selector="10">10</value>
            <value selector="3">3</value>
            <value selector="4">4</value>
            <value selector="5">5</value>
            <value>4</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_sshd_required" type="number">
            <title xml:lang="en-US">SSH is required to be installed</title>
            <description xml:lang="en-US">Specify if the Policy requires SSH to be installed. Used by SSH Rules
to determine if SSH should be uninstalled or configured.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
A value of 0 means that the policy doesn't care if OpenSSH server is installed or not. If it is installed, scanner will check for it's configuration, if it's not installed, the check will pass.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
A value of 1 indicates that OpenSSH server package is not required by the policy;<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
A value of 2 indicates that OpenSSH server package is required by the policy.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
            <value>0</value>
            <value selector="no">1</value>
            <value selector="yes">2</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_sshd_approved_macs" type="string">
            <title xml:lang="en-US">SSH Approved MACs by FIPS</title>
            <description xml:lang="en-US">Specify the FIPS approved MACs (message authentication code) algorithms
	that are used for data integrity protection by the SSH server.</description>
            <value>hmac-sha2-512,hmac-sha2-256</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" type="number">
            <title xml:lang="en-US">SSH session Idle time</title>
            <description xml:lang="en-US">Specify duration of allowed idle time.</description>
            <value selector="10_minutes">600</value>
            <value selector="120_minutes">7200</value>
            <value selector="15_minutes">900</value>
            <value selector="30_minutes">1800</value>
            <value selector="5_minutes">300</value>
            <value selector="60_minutes">3600</value>
            <value>300</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_var_sshd_set_keepalive" type="number">
            <title xml:lang="en-US">SSH Max Keep Alive Count</title>
            <description xml:lang="en-US">Specify the maximum number of idle message counts before session is terminated.</description>
            <value selector="10">10</value>
            <value selector="3">3</value>
            <value selector="5">5</value>
            <value selector="0">0</value>
            <value selector="1">1</value>
            <value>0</value>
          </Value>
          <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_sshd_private_key" selected="false" severity="medium">
            <version>SLES-12-030220</version>
            <title xml:lang="en-US">Verify Permissions on SSH Server Private *_key Key Files</title>
            <description xml:lang="en-US"> To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/*_key</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0600 /etc/ssh/*_key</html:pre></description>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030220</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92161r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.10</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
            <rationale xml:lang="en-US">If an unauthorized user obtains the private SSH host key file, the host could be
impersonated.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="file_permissions_sshd_private_key" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">find /etc/ssh -regex '^/etc/ssh/.*_key$' -exec chmod 0600 {} \;
</fix>
            <fix id="file_permissions_sshd_private_key" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Find /etc/ssh file(s)
  find:
    paths: /etc/ssh
    patterns: ^.*_key$
    use_regex: true
  register: files_found
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - file_permissions_sshd_private_key
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-53-AC-17
    - NIST-800-171-3.1.13
    - NIST-800-171-3.13.10
    - DISA-STIG-030220

- name: Set permissions for /etc/ssh file(s)
  file:
    path: '{{ item.path }}'
    mode: 384
  with_items:
    - '{{ files_found.files }}'
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - file_permissions_sshd_private_key
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-53-AC-17
    - NIST-800-171-3.1.13
    - NIST-800-171-3.13.10
    - DISA-STIG-030220
</fix>
            <fix id="file_permissions_sshd_private_key" system="urn:xccdf:fix:script:puppet">include ssh_private_key_perms

class ssh_private_key_perms {
  exec { 'sshd_priv_key':
    command =&gt; "chmod 0640 /etc/ssh/*_key",
    path    =&gt; '/bin:/usr/bin'
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-file_permissions_sshd_private_key:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-file_permissions_sshd_private_key_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_sshd_pub_key" selected="false" severity="medium">
            <version>SLES-12-030210</version>
            <title xml:lang="en-US">Verify Permissions on SSH Server Public *.pub Key Files</title>
            <description xml:lang="en-US"> To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/*.pub</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0644 /etc/ssh/*.pub</html:pre></description>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030210</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92159r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.10</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
            <rationale xml:lang="en-US">If a public host key file is modified by an unauthorized user, the SSH service
may be compromised.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="file_permissions_sshd_pub_key" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">find /etc/ssh -regex '^/etc/ssh/.*.pub$' -exec chmod 0644 {} \;
</fix>
            <fix id="file_permissions_sshd_pub_key" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Find /etc/ssh file(s)
  find:
    paths: /etc/ssh
    patterns: ^.*.pub$
    use_regex: true
  register: files_found
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - file_permissions_sshd_pub_key
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-171-3.1.13
    - NIST-800-171-3.13.10
    - DISA-STIG-030210

- name: Set permissions for /etc/ssh file(s)
  file:
    path: '{{ item.path }}'
    mode: 420
  with_items:
    - '{{ files_found.files }}'
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - file_permissions_sshd_pub_key
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-171-3.1.13
    - NIST-800-171-3.13.10
    - DISA-STIG-030210
</fix>
            <fix id="file_permissions_sshd_pub_key" system="urn:xccdf:fix:script:puppet">include ssh_public_key_perms

class ssh_public_key_perms {
  exec { 'sshd_pub_key':
    command =&gt; "chmod 0644 /etc/ssh/*.pub",
    path    =&gt; '/bin:/usr/bin'
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-file_permissions_sshd_pub_key:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-file_permissions_sshd_pub_key_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_iptables_sshd_disabled" selected="false" severity="unknown">
            <title xml:lang="en-US">Remove SSH Server iptables Firewall exception (Unusual)</title>
            <description xml:lang="en-US">By default, inbound connections to SSH's port are allowed. If the SSH
server is not being used, this exception should be removed from the
firewall configuration.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Edit the files <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use). In each file, locate
and delete the line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT</html:pre>
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.</description>
            <rationale xml:lang="en-US">If inbound SSH connections are not expected, disallowing access to the SSH
port will avoid possible exploitation of the port by an attacker.</rationale>
            <platform idref="cpe:/a:machine"/>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_sshd_disabled" selected="false" severity="unknown">
            <title xml:lang="en-US">Disable SSH Server If Possible (Unusual)</title>
            <description xml:lang="en-US">The SSH server service, sshd, is commonly needed.
However, if it can be disabled, do so.


The <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd</html:code> service can be disabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl disable sshd.service</html:pre>

This is unusual, as SSH is a common method for encrypted and authenticated
remote access.</description>
            <rationale xml:lang="en-US"/>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_sshd_disabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable">
SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" stop 'sshd.service'
"$SYSTEMCTL_EXEC" disable 'sshd.service'
# Disable socket activation if we have a unit file for it
"$SYSTEMCTL_EXEC" list-unit-files | grep -q '^sshd.socket\&gt;' &amp;&amp; "$SYSTEMCTL_EXEC" disable 'sshd.socket'
# The service may not be running because it has been started and failed,
# so let's reset the state so OVAL checks pass.
# Service should be 'inactive', not 'failed' after reboot though.
"$SYSTEMCTL_EXEC" reset-failed 'sshd.service'
</fix>
            <fix id="service_sshd_disabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="disable">- name: Disable service sshd
  service:
    name: sshd
    enabled: 'no'
    state: stopped
  register: service_result
  failed_when: service_result is failed and ('Could not find the requested service'
    not in service_result.msg)
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_sshd_disabled
    - unknown_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed

- name: Disable socket of service sshd if applicable
  service:
    name: sshd.socket
    enabled: 'no'
    state: stopped
  register: socket_result
  failed_when: socket_result is failed and ('Could not find the requested service'
    not in socket_result.msg)
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_sshd_disabled
    - unknown_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_sshd_disabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_sshd_enabled" selected="false" severity="medium">
            <version>SLES-12-030100</version>
            <title xml:lang="en-US">Enable the OpenSSH Service</title>
            <description xml:lang="en-US">The SSH server service, sshd, is commonly needed.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable sshd.service</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030100</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92137r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.4</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.8</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002418</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002420</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002421</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002422</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-8</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-2</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000423-GPOS-00187</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000423-GPOS-00188</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000423-GPOS-00189</reference>
            <reference href="">SRG-OS000423-GPOS-00190</reference>
            <rationale xml:lang="en-US">Without protection of the transmitted information, confidentiality, and
integrity may be compromised because unprotected communications can be
intercepted and either read or altered.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This checklist item applies to both internal and external networks and all types
of information system components from which information can be transmitted (e.g., servers,
mobile devices, notebook computers, printers, copiers, scanners, etc). Communication paths
outside the physical protection of a controlled boundary are exposed to the possibility
of interception and modification.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_sshd_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'openssh' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'sshd.service'
"$SYSTEMCTL_EXEC" enable 'sshd.service'
</fix>
            <fix id="service_sshd_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service sshd
  service:
    name: sshd
    enabled: 'yes'
    state: started
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_sshd_enabled
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-SC-8
    - NIST-800-171-3.1.13
    - NIST-800-171-3.5.4
    - NIST-800-171-3.13.8
    - DISA-STIG-030100
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_sshd_enabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_sshd_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_openssh_installed" selected="false" severity="medium">
            <title xml:lang="en-US">Install the OpenSSH Client and Server Package</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">openssh</html:code> package should be installed.
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">openssh</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install openssh</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002418</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002420</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002421</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002422</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-8</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000423-GPOS-00187</reference>
            <rationale xml:lang="en-US">Without protection of the transmitted information, confidentiality, and
integrity may be compromised because unprotected communications can be
intercepted and either read or altered.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_openssh_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install openssh
</fix>
            <fix id="package_openssh_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure openssh is installed
  package:
    name: openssh
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_openssh_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-SC-8
</fix>
            <fix id="package_openssh_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_openssh

class install_openssh {
  package { 'openssh':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_openssh_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-package_openssh_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_ssh_server">
            <title xml:lang="en-US">Configure OpenSSH Server if Necessary</title>
            <description xml:lang="en-US">If the system needs to act as an SSH server, then
certain changes should be made to the OpenSSH daemon configuration
file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>. The following recommendations can be
applied to this file. See the <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd_config(5)</html:code> man page for more
detailed information.</description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_var_sshd_priv_separation" type="string">
              <title xml:lang="en-US">SSH Privilege Separation Setting</title>
              <description xml:lang="en-US">Specify whether and how sshd separates privileges when handling incoming network connections.</description>
              <value selector="no">no</value>
              <value selector="yes">yes</value>
              <value selector="sandbox">sandbox</value>
              <value>sandbox</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="false" severity="medium">
              <title xml:lang="en-US">Disable Host-Based Authentication</title>
              <description xml:lang="en-US">SSH's cryptographic host-based authentication is
more secure than <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rhosts</html:code> authentication. However, it is
not recommended that hosts unilaterally trust one another, even
within an organization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To disable host-based authentication, add or correct the
following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">HostbasedAuthentication no</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00229</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="disable_host_auth" system="urn:xccdf:fix:script:sh">grep -q ^HostbasedAuthentication /etc/ssh/sshd_config &amp;&amp; \
  sed -i "s/HostbasedAuthentication.*/HostbasedAuthentication no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
    echo "HostbasedAuthentication no" &gt;&gt; /etc/ssh/sshd_config
fi
</fix>
              <fix id="disable_host_auth" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="restrict">- name: Disable Host-Based Authentication
  lineinfile:
    create: true
    dest: /etc/ssh/sshd_config
    regexp: ^HostbasedAuthentication
    line: HostbasedAuthentication no
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - disable_host_auth
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-3
    - NIST-800-53-AC-17
    - NIST-800-53-CM-6(b)
    - NIST-800-171-3.1.12
    - CJIS-5.5.6
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-disable_host_auth:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-disable_host_auth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="false" severity="high">
              <title xml:lang="en-US">Allow Only SSH Protocol 2</title>
              <description xml:lang="en-US">Only SSH protocol version 2 connections should be
permitted. The default setting in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> is correct, and can be
verified by ensuring that the following
line appears:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Protocol 2</html:pre></description>
              <warning xml:lang="en-US" category="general">As of <html:code xmlns:html="http://www.w3.org/1999/xhtml">openssh-server</html:code> version <html:code xmlns:html="http://www.w3.org/1999/xhtml">7.4</html:code> and above, the only protocol
supported is version 2, and line <html:pre xmlns:html="http://www.w3.org/1999/xhtml">Protocol 2</html:pre> in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> is not necessary.</warning>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.4</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000197</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8).1(ii)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000074-GPOS-00042</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000033-VMM-000140</reference>
              <rationale xml:lang="en-US">SSH protocol version 1 is an insecure implementation of the SSH protocol and
has many well-known vulnerability exploits. Exploits of the SSH daemon could provide
immediate root access to the system.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_compression" selected="false" severity="medium">
              <version>SLES-12-030250</version>
              <title xml:lang="en-US">Disable Compression Or Set Compression to delayed</title>
              <description xml:lang="en-US">Compression is useful for slow network connections over long
distances but can cause performance issues on local LANs. If use of compression
is required, it should be enabled only after a user has authenticated; otherwise
, it should be disabled. To disable compression or delay compression until after
a user has successfully authenticated, add or correct the following line in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Compression no</html:pre> or <html:pre xmlns:html="http://www.w3.org/1999/xhtml">Compression delayed</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030250</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92167r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">If compression is allowed in an SSH connection prior to authentication,
vulnerabilities in the compression software could result in compromise of the
system from an unauthenticated connection, potentially wih root privileges.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_disable_compression" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^Compression' 'delayed' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_disable_compression:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_compression_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="false" severity="high">
              <version>SLES-12-030150</version>
              <title xml:lang="en-US">Disable SSH Access via Empty Passwords</title>
              <description xml:lang="en-US">To explicitly disallow SSH login from accounts with
empty passwords, add or correct the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PermitEmptyPasswords no</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Any accounts with empty passwords should be disabled immediately, and PAM configuration
should prevent users from being able to assign themselves empty passwords.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030150</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92147r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.9</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00229</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">Configuring this setting for the SSH daemon provides additional assurance
that remote login via SSH will require a password, even in the event of 
misconfiguration elsewhere.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_disable_empty_passwords" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^PermitEmptyPasswords' 'no' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_disable_empty_passwords:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_gssapi_auth" selected="false" severity="medium">
              <title xml:lang="en-US">Disable GSSAPI Authentication</title>
              <description xml:lang="en-US">Unless needed, SSH should not permit extraneous or unnecessary
authentication mechanisms like GSSAPI. To disable GSSAPI authentication, add or
correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">GSSAPIAuthentication no</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000368</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000318</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001812</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001813</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001814</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(c)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000364-GPOS-00151</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">GSSAPI authentication is used to provide additional authentication mechanisms to
applications. Allowing GSSAPI authentication through SSH exposes the system's
GSSAPI to remote hosts, increasing the attack surface of the system.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_gssapi_auth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_kerb_auth" selected="false" severity="medium">
              <title xml:lang="en-US">Disable Kerberos Authentication</title>
              <description xml:lang="en-US">Unless needed, SSH should not permit extraneous or unnecessary
authentication mechanisms like Kerberos. To disable Kerberos authentication, add
or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">KerberosAuthentication no</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000368</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000318</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001812</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001813</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001814</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(c)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000364-GPOS-00151</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">Kerberos authentication for SSH is often implemented using GSSAPI. If Kerberos
is enabled through SSH, the SSH daemon provides a means of access to the
system's Kerberos implementation. Vulnerabilities in the system's Kerberos
implementations may be subject to exploitation.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_kerb_auth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="false" severity="medium">
              <title xml:lang="en-US">Disable SSH Support for .rhosts Files</title>
              <description xml:lang="en-US">SSH can emulate the behavior of the obsolete rsh
command in allowing users to enable insecure access to their
accounts via <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rhosts</html:code> files.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To ensure this behavior is disabled, add or correct the
following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">IgnoreRhosts yes</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(a)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000107-VMM-000530</reference>
              <rationale xml:lang="en-US">SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts_rsa" selected="false" severity="medium">
              <title xml:lang="en-US">Disable SSH Support for Rhosts RSA Authentication</title>
              <description xml:lang="en-US">SSH can allow authentication through the obsolete rsh
command through the use of the authenticating user's SSH keys. This should be disabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To ensure this behavior is disabled, add or correct the
following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">RhostsRSAAuthentication no</html:pre></description>
              <warning xml:lang="en-US" category="general">As of <html:code xmlns:html="http://www.w3.org/1999/xhtml">openssh-server</html:code> version <html:code xmlns:html="http://www.w3.org/1999/xhtml">7.4</html:code> and above,
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">RhostsRSAAuthentication</html:code> option has been deprecated, and the line
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">RhostsRSAAuthentication no</html:pre> in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> is not
necessary.</warning>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Configuring this setting for the SSH daemon provides additional
assurance that remove login via SSH will require a password, even
in the event of misconfiguration elsewhere.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_disable_rhosts_rsa:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_rhosts_rsa_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="false" severity="medium">
              <version>SLES-12-030140</version>
              <title xml:lang="en-US">Disable SSH Root Login</title>
              <description xml:lang="en-US">The root user should never be allowed to login to a
system directly over a network.
To disable root login via SSH, add or correct the following line
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PermitRootLogin no</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000770</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(5)</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000109-GPOS-00056</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030140</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92145r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(5)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">Even though the communications channel may be encrypted, an additional layer of
security is gained by extending the policy of not logging directly on as root.
In addition, logging in with a user-specific account provides individual
accountability of actions performed on the system and also helps to minimize
direct attack attempts on root's password.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_disable_root_login" system="urn:xccdf:fix:script:sh">
SSHD_CONFIG='/etc/ssh/sshd_config'

# Obtain line number of first uncommented case-insensitive occurrence of Match
# block directive (possibly prefixed with whitespace) present in $SSHD_CONFIG
FIRST_MATCH_BLOCK=$(sed -n '/^[[:space:]]*Match[^\n]*/I{=;q}' $SSHD_CONFIG)

# Obtain line number of first uncommented case-insensitive occurence of
# PermitRootLogin directive (possibly prefixed with whitespace) present in
# $SSHD_CONFIG
FIRST_PERMIT_ROOT_LOGIN=$(sed -n '/^[[:space:]]*PermitRootLogin[^\n]*/I{=;q}' $SSHD_CONFIG)

# Case: Match block directive not present in $SSHD_CONFIG
if [ -z "$FIRST_MATCH_BLOCK" ]
then

    # Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
    if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
    then
        # Append 'PermitRootLogin no' at the end of $SSHD_CONFIG
        echo -e "\nPermitRootLogin no" &gt;&gt; $SSHD_CONFIG

    # Case: PermitRootLogin directive present in $SSHD_CONFIG already
    else
        # Replace first uncommented case-insensitive occurrence
        # of PermitRootLogin directive
        sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG
    fi

# Case: Match block directive present in $SSHD_CONFIG
else

    # Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
    if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
    then
        # Prepend 'PermitRootLogin no' before first uncommented
        # case-insensitive occurrence of Match block directive
        sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG

    # Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
    #       before first Match block directive
    elif [ "$FIRST_PERMIT_ROOT_LOGIN" -lt "$FIRST_MATCH_BLOCK" ]
    then
        # Replace first uncommented case-insensitive occurrence
        # of PermitRootLogin directive
        sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG

    # Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
    # after first Match block directive
    else
         # Prepend 'PermitRootLogin no' before first uncommented
         # case-insensitive occurrence of Match block directive
         sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG
    fi
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_disable_root_login:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_user_known_hosts" selected="false" severity="medium">
              <version>SLES-12-030200</version>
              <title xml:lang="en-US">Disable SSH Support for User Known Hosts</title>
              <description xml:lang="en-US">SSH can allow system users host-based authentication to connect to systems
if a cache of the remote systems public keys are available.  This should be
disabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To ensure this behavior is disabled, add or correct the
following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">IgnoreUserKnownHosts yes</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030200</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92157r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(a)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Configuring this setting for the SSH daemon provides additional
assurance that remove login via SSH will require a password, even
in the event of misconfiguration elsewhere.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_disable_user_known_hosts" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^IgnoreUserKnownHosts' 'yes' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_disable_user_known_hosts:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_disable_user_known_hosts_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="false" severity="medium">
              <version>SLES-12-030150</version>
              <title xml:lang="en-US">Do Not Allow SSH Environment Options</title>
              <description xml:lang="en-US">To ensure users are not able to override environment
options to the SSH daemon, add or correct the following line
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PermitUserEnvironment no</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030150</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92147r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00229</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">SSH environment options potentially allow users to bypass
access restriction in some configurations.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_do_not_permit_user_env" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^PermitUserEnvironment' 'no' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_do_not_permit_user_env:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_enable_strictmodes" selected="false" severity="medium">
              <version>SLES-12-030230</version>
              <title xml:lang="en-US">Enable Use of Strict Mode Checking</title>
              <description xml:lang="en-US">SSHs StrictModes option checks file and ownership permissions in
the user's home directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">.ssh</html:code> folder before accepting login. If world-
writable permissions are found, logon is rejected. To enable StrictModes in SSH,
add or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">StrictModes yes</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030230</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92163r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">If other users have access to modify user-specific SSH configuration files, they
may be able to log into the system as another user.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_enable_strictmodes" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^StrictModes' 'yes' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_enable_strictmodes:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_enable_strictmodes_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="false" severity="medium">
              <version>SLES-12-030120, SLES-12-030050</version>
              <title xml:lang="en-US">Enable SSH Warning Banner</title>
              <description xml:lang="en-US">To enable the warning banner and ensure it is consistent
across the system, add or correct the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Banner /etc/issue</html:pre>
Another section contains information on how to create an
appropriate system-wide warning banner.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030120</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92141r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030050</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92135r3_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.9</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000050</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001384</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001385</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001386</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001387</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001388</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(3)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000023-GPOS-00006</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000024-GPOS-00007</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000228-GPOS-00088</reference>
              <reference href="">SRG-OS-000023-VMM-000060</reference>
              <reference href="">SRG-OS-000024-VMM-000070</reference>
              <rationale xml:lang="en-US">The warning message reinforces policy awareness during the logon process and
facilitates possible legal action against attackers. Alternatively, systems
whose ownership should not be obvious should ensure usage of a banner that does
not provide easy attribution.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_enable_warning_banner" system="urn:xccdf:fix:script:sh">
grep -q ^Banner /etc/ssh/sshd_config &amp;&amp; \
  sed -i "s/Banner.*/Banner \/etc\/issue/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
    echo "Banner /etc/issue" &gt;&gt; /etc/ssh/sshd_config
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_enable_warning_banner:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_enable_x11_forwarding" selected="false" severity="high">
              <version>SLES-12-030260</version>
              <title xml:lang="en-US">Enable Encrypted X11 Forwarding</title>
              <description xml:lang="en-US">By default, remote X11 connections are not encrypted when initiated
by users. SSH has the capability to encrypt remote X11 connections when SSH's
<html:code xmlns:html="http://www.w3.org/1999/xhtml">X11Forwarding</html:code> option is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To enable X11 Forwarding, add or correct the
following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">X11Forwarding yes</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030260</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92169r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">20</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.08</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI07.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-2(1)(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Open X displays allow an attacker to capture keystrokes and to execute commands
remotely.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_enable_x11_forwarding" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^X11Forwarding' 'yes' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_enable_x11_forwarding:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_enable_x11_forwarding_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_limit_user_access" selected="false" severity="unknown">
              <title xml:lang="en-US">Limit Users' SSH Access</title>
              <description xml:lang="en-US">By default, the SSH configuration allows any user with an account
to access the system. In order to specify the users that are allowed to login
via SSH and deny all other users, add or correct the following line in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">DenyUsers USER1 USER2</html:pre>
Where <html:code xmlns:html="http://www.w3.org/1999/xhtml">USER1</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">USER2</html:code> are valid user names.</description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">Specifying which accounts are allowed SSH access into the system reduces the
possibility of unauthorized access to the system.</rationale>
              <platform idref="cpe:/a:machine"/>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_print_last_log" selected="false" severity="medium">
              <version>SLES-12-030130</version>
              <title xml:lang="en-US">Enable SSH Print Last Log</title>
              <description xml:lang="en-US">When enabled, SSH will display the date and time of the last
successful account logon. To enable LastLog in
SSH, add or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PrintLastLog yes</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030130</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92143r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-9</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Providing users feedback on when account accesses last occurred facilitates user
recognition and reporting of unauthorized account use.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_print_last_log" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^PrintLastLog' 'yes' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_print_last_log:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_print_last_log_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="false" severity="medium">
              <version>SLES-12-030190</version>
              <title xml:lang="en-US">Set SSH Idle Timeout Interval</title>
              <description xml:lang="en-US">SSH allows administrators to set an idle timeout
interval.
After this interval has passed, the idle user will be
automatically logged out.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To set an idle timeout interval, edit the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> as
follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">ClientAliveInterval <html:b><sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy"/></html:b></html:pre>
The timeout <html:b xmlns:html="http://www.w3.org/1999/xhtml">interval</html:b> is given in seconds. To have a timeout

of 10 minutes, set <html:b xmlns:html="http://www.w3.org/1999/xhtml">interval</html:b> to 600.

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If a shorter timeout has already been set for the login
shell, that value will preempt any SSH
setting made here. Keep in mind that some processes may stop SSH
from correctly detecting that the user is idle.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000879</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001133</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002361</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(e)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-12</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000126-GPOS-00066</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000163-GPOS-00072</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000279-GPOS-00109</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030190</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92155r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.11</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001133</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002361</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8(i)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-12</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-2</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000163-GPOS-00072</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000279-GPOS-00109</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">Terminating an idle ssh session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
enabled on the console or console port that has been let unattended.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_set_idle_timeout" system="urn:xccdf:fix:script:sh">
sshd_idle_timeout_value="<sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^ClientAliveInterval' $sshd_idle_timeout_value '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-export export-name="oval:ssg-sshd_idle_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value"/>
                <check-content-ref name="oval:ssg-sshd_set_idle_timeout:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="false" severity="medium">
              <version>SLES-12-030191</version>
              <title xml:lang="en-US">Set SSH Client Alive Max Count</title>
              <description xml:lang="en-US">To ensure the SSH idle timeout occurs precisely when the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ClientAliveInterval</html:code> is set,
edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">ClientAliveCountMax <sub idref="xccdf_org.ssgproject.content_value_var_sshd_set_keepalive" use="legacy"/></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000879</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001133</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002361</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(e)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-12</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030191</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-96515r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.11</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001133</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002361</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-12</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-2</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000163-GPOS-00072</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000279-GPOS-00109A</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">This ensures a user login will be terminated as soon as the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ClientAliveInterval</html:code>
is reached.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_set_keepalive" system="urn:xccdf:fix:script:sh">
var_sshd_set_keepalive="<sub idref="xccdf_org.ssgproject.content_value_var_sshd_set_keepalive" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^ClientAliveCountMax' "$var_sshd_set_keepalive" '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-export export-name="oval:ssg-sshd_max_auth_tries_value:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_max_auth_tries_value"/>
                <check-content-ref name="oval:ssg-sshd_set_keepalive:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_set_loglevel_info" selected="false" severity="low">
              <title xml:lang="en-US">Set LogLevel to INFO</title>
              <description xml:lang="en-US">The INFO parameter specifices that record login and logout activity will be logged.
To specify the log level in
SSH, add or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">LogLevel INFO</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <rationale xml:lang="en-US">SSH provides several logging levels with varying amounts of verbosity. <html:code xmlns:html="http://www.w3.org/1999/xhtml">DEBUG</html:code> is specifically
not recommended other than strictly for debugging SSH communications since it provides
so much data that it is difficult to identify important security information. <html:code xmlns:html="http://www.w3.org/1999/xhtml">INFO</html:code> level is the
basic level that only records login activity of SSH users. In many situations, such as Incident
Response, it is important to determine when a particular user was active on a system. The
logout record can eliminate those users who disconnected, which helps narrow the field.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-sshd_set_loglevel_info:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_set_loglevel_info_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_set_max_auth_tries" selected="false" severity="medium">
              <title xml:lang="en-US">Set SSH authentication attempt limit</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">MaxAuthTries</html:code> parameter specifies the maximum number of authentication attempts
permitted per connection. Once the number of failures reaches half this value, additional failures are logged.
to set MaxAUthTries edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">MaxAuthTries <html:b>tries</html:b></html:pre></description>
              <rationale xml:lang="en-US">Setting the MaxAuthTries parameter to a low number will minimize the risk of successful
brute force attacks to the SSH server.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_max_auth_tries_value:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_max_auth_tries_value"/>
                <check-content-ref name="oval:ssg-sshd_set_max_auth_tries:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_set_max_auth_tries_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="false" severity="medium">
              <version>SLES-12-030170</version>
              <title xml:lang="en-US">Use Only DoD-approved encryption Ciphers</title>
              <description xml:lang="en-US">
Limit the ciphers to those algorithms which are DoD-approved.
Only Counter (CTR) mode is allowed inside the SSH daemon configuration.
The following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>
demonstrates use of DoD-approved encryption ciphers:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Ciphers aes128-ctr,aes192-ctr,aes256-ctr</html:pre>
The man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd_config(5)</html:code> contains a list of supported ciphers.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002890</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(6)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030170</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92151r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.8</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(2)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(b)(2)(i)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10(5)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000033-GPOS-00014</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000120-GPOS-00061</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000125-GPOS-00065</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000250-GPOS-00093</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000393-GPOS-00173</reference>
              <reference href="">SRG-OS-000033-VMM-000140</reference>
              <reference href="">SRG-OS-000120-VMM-000600</reference>
              <reference href="">SRG-OS-000478-VMM-001980</reference>
              <reference href="">SRG-OS-000396-VMM-001590</reference>
              <rationale xml:lang="en-US">
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore
cannot be relied upon to provide confidentiality or integrity, and system data may be compromised.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Operating systems utilizing encryption are required to use DoD-approved ciphers to protect the confidentiality
of SSH remote connections.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_use_approved_ciphers" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^Ciphers' 'aes128-ctr,aes192-ctr,aes256-ctr' '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_use_approved_ciphers:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_macs" selected="false" severity="medium">
              <version>SLES-12-030180</version>
              <title xml:lang="en-US">Use Only FIPS 140-2 Validated MACs</title>
              <description xml:lang="en-US">Limit the MACs to those hash algorithms which are FIPS-approved.
The following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code>
demonstrates use of FIPS-approved MACs:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">MACs hmac-sha2-512,hmac-sha2-256</html:pre>

The man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">sshd_config(5)</html:code> contains a list of supported MACs.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000877</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001453</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-003123</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(6)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030180</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92153r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.13</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.8</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001453</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(2)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(b)(2)(i)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000250-GPOS-00093</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000125-GPOS-00065</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000394-GPOS-00174</reference>
              <reference href="">SRG-OS-000033-VMM-000140</reference>
              <reference href="">SRG-OS-000120-VMM-000600</reference>
              <reference href="">SRG-OS-000478-VMM-001980</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <reference href="">SRG-OS-000396-VMM-001590</reference>
              <rationale xml:lang="en-US">DoD Information Systems are required to use FIPS-approved cryptographic hash
functions. The only SSHv2 hash algorithms meeting this requirement is SHA2.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_use_approved_macs" system="urn:xccdf:fix:script:sh">
sshd_approved_macs="<sub idref="xccdf_org.ssgproject.content_value_sshd_approved_macs" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^MACs' "$sshd_approved_macs" '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-export export-name="oval:ssg-sshd_approved_macs:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_approved_macs"/>
                <check-content-ref name="oval:ssg-sshd_use_approved_macs:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_use_priv_separation" selected="false" severity="medium">
              <version>SLES-12-030240</version>
              <title xml:lang="en-US">Enable Use of Privilege Separation</title>
              <description xml:lang="en-US">When enabled, SSH will create an unprivileged child process that
has the privilege of the authenticated user. To enable privilege separation in
SSH, add or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">UsePrivilegeSeparation <sub idref="xccdf_org.ssgproject.content_value_var_sshd_priv_separation" use="legacy"/></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030240</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92165r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.12</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(3)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">SSH daemon privilege separation causes the SSH process to drop root privileges
when not needed which would decrease the impact of software vulnerabilities in
the unprivileged section.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_use_priv_separation" system="urn:xccdf:fix:script:sh">
var_sshd_priv_separation="<sub idref="xccdf_org.ssgproject.content_value_var_sshd_priv_separation" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/ssh/sshd_config' '^UsePrivilegeSeparation' "$var_sshd_priv_separation" '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_sshd_priv_separation:var:1" value-id="xccdf_org.ssgproject.content_value_var_sshd_priv_separation"/>
                <check-export export-name="oval:ssg-sshd_required:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_required"/>
                <check-content-ref name="oval:ssg-sshd_use_priv_separation:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_use_priv_separation_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sshd_set_loglevel_verbose" selected="false" severity="medium">
              <version>SLES-12-030110</version>
              <title xml:lang="en-US">Set SSH Daemon LogLevel to VERBOSE</title>
              <description xml:lang="en-US">The VERBOSE parameter specifices that record login and logout activity will be logged.
To specify the log level in
SSH, add or correct the following line in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/ssh/sshd_config</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">LogLevel VERBOSE</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000067</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030110</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92139r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000032-GPOS-00013</reference>
              <rationale xml:lang="en-US">SSH provides several logging levels with varying amounts of verbosity. <html:code xmlns:html="http://www.w3.org/1999/xhtml">DEBUG</html:code> is specifically
not recommended other than strictly for debugging SSH communications since it provides
so much data that it is difficult to identify important security information. <html:code xmlns:html="http://www.w3.org/1999/xhtml">INFO</html:code> or 
<html:code xmlns:html="http://www.w3.org/1999/xhtml">VERBOSE</html:code> level is the basic level that only records login activity of SSH users. In many
situations, such as Incident Response, it is important to determine when a particular user was active
on a system. The logout record can eliminate those users who disconnected, which helps narrow the
field.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="sshd_set_loglevel_verbose" system="urn:xccdf:fix:script:sh">
grep -q ^LogLevel /etc/ssh/sshd_config &amp;&amp; \
  sed -i "s/^LogLevel.*/LogLevel VERBOSE/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
    echo "LogLevel VERBOSE" &gt;&gt; /etc/ssh/sshd_config
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-sshd_set_loglevel_verbose:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sshd_set_loglevel_verbose_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall">
              <title xml:lang="en-US">Strengthen Firewall Configuration if Possible</title>
              <description xml:lang="en-US">If the SSH server is expected to only receive connections from
the local network, then strengthen the default firewall rule for the SSH service
to only accept connections from the appropriate network segment(s).
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Determine an appropriate network block, <html:code xmlns:html="http://www.w3.org/1999/xhtml">netwk</html:code>, network mask, <html:code xmlns:html="http://www.w3.org/1999/xhtml">mask</html:code>, and
network protocol, <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip_protocol</html:code>, representing the systems on your network which will
be allowed to access this SSH server.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">firewall-cmd --permanent --add-rich-rule='rule family="ip_protocol" source address="netwk/mask" service name="ssh" accept'</html:pre></description>
              <platform idref="cpe:/a:machine"/>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_sssd">
          <title xml:lang="en-US">System Security Services Daemon</title>
          <description xml:lang="en-US">The System Security Services Daemon (SSSD) is a system daemon that provides access
to different identity and authentication providers such as Red Hat's IdM, Microsoft's AD,
openLDAP, MIT Kerberos, etc. It uses a common framework that can provide caching and offline
support to systems utilizing SSSD. SSSD using caching to reduce load on authentication
servers permit offline authentication as well as store extended user data.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For more information, see</description>
          <platform idref="cpe:/a:machine"/>
          <Value id="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" type="number">
            <title xml:lang="en-US">SSSD memcache_timeout option</title>
            <description xml:lang="en-US">Value of the memcache_timeout option in the [nss] section
of SSSD config /etc/sssd/sssd.conf.</description>
            <value selector="3_minutes">180</value>
            <value selector="5_minutes">300</value>
            <value selector="10_minutes">600</value>
            <value selector="15_minutes">900</value>
            <value selector="30_minutes">1800</value>
            <value selector="1_day">86400</value>
            <value>300</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_var_sssd_ssh_known_hosts_timeout" type="number">
            <title xml:lang="en-US">SSSD ssh_known_hosts_timeout option</title>
            <description xml:lang="en-US">Value of the ssh_known_hosts_timeout option in the [ssh] section
of SSSD configuration file /etc/sssd/sssd.conf.</description>
            <value selector="3_minutes">180</value>
            <value selector="5_minutes">300</value>
            <value selector="10_minutes">600</value>
            <value selector="15_minutes">900</value>
            <value selector="30_minutes">1800</value>
            <value selector="1_day">86400</value>
            <value>180</value>
          </Value>
          <Rule id="xccdf_org.ssgproject.content_rule_sssd_memcache_timeout" selected="false" severity="medium">
            <version>SLES-12-010670</version>
            <title xml:lang="en-US">Configure SSSD's Memory Cache to Expire</title>
            <description xml:lang="en-US">SSSD's memory cache should be configured to set to expire records after
<html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" use="legacy"/></html:code> seconds.
To configure SSSD to expire memory cache, set <html:code xmlns:html="http://www.w3.org/1999/xhtml">memcache_timeout</html:code> to
<html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" use="legacy"/></html:code> under the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">[nss]</html:code> section in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sssd/sssd.conf</html:code>.

For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">[nss]
memcache_timeout = <sub idref="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" use="legacy"/>
</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010670</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91879r3_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002007</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(10)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(13)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
            <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000383-GPOS-00166</reference>
            <reference href="">SRG-OS-000383-VMM-001570</reference>
            <rationale xml:lang="en-US">If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="sssd_memcache_timeout" system="urn:xccdf:fix:script:sh">
var_sssd_memcache_timeout="<sub idref="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout" use="legacy"/>"

SSSD_CONF="/etc/sssd/sssd.conf"
MEMCACHE_TIMEOUT_REGEX="[[:space:]]*\[nss]([^\n\[]*\n+)+?[[:space:]]*memcache_timeout"
NSS_REGEX="[[:space:]]*\[nss]"

# Try find [nss] and memcache_timeout in sssd.conf, if it exists, set to
# var_sssd_memcache_timeout, if it isn't here, add it, if [nss] doesn't
# exist, add it there
if grep -qzosP $MEMCACHE_TIMEOUT_REGEX $SSSD_CONF; then
        sed -i "s/memcache_timeout[^(\n)]*/memcache_timeout = $var_sssd_memcache_timeout/" $SSSD_CONF
elif grep -qs $NSS_REGEX $SSSD_CONF; then
        sed -i "/$NSS_REGEX/a memcache_timeout = $var_sssd_memcache_timeout" $SSSD_CONF
else
        mkdir -p /etc/sssd
        touch $SSSD_CONF
        echo -e "[nss]\nmemcache_timeout = $var_sssd_memcache_timeout" &gt;&gt; $SSSD_CONF
fi
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-export export-name="oval:ssg-var_sssd_memcache_timeout:var:1" value-id="xccdf_org.ssgproject.content_value_var_sssd_memcache_timeout"/>
              <check-content-ref name="oval:ssg-sssd_memcache_timeout:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_sssd_offline_cred_expiration" selected="false" severity="medium">
            <version>SLES-12-010680</version>
            <title xml:lang="en-US">Configure SSSD to Expire Offline Credentials</title>
            <description xml:lang="en-US">SSSD should be configured to expire offline credentials after 1 day.
To configure SSSD to expire offline credentials, set
<html:code xmlns:html="http://www.w3.org/1999/xhtml">offline_credentials_expiration</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">1</html:code> under the <html:code xmlns:html="http://www.w3.org/1999/xhtml">[pam]</html:code>
section in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sssd/sssd.conf</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[pam]
offline_credentials_expiration = 1
</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010680</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91881r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002007</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(13)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
            <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000383-GPOS-00166</reference>
            <reference href="">SRG-OS-000383-VMM-001570</reference>
            <rationale xml:lang="en-US">If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="sssd_offline_cred_expiration" system="urn:xccdf:fix:script:sh" complexity="low" disruption="medium" strategy="configure">
SSSD_CONF="/etc/sssd/sssd.conf"
SSSD_OPT="offline_credentials_expiration"
SSSD_OPT_VAL=1
PAM_REGEX="[[:space:]]*\[pam]"
PAM_OPT_REGEX="${PAM_REGEX}([^\n\[]*\n+)+?[[:space:]]*${SSSD_OPT}"

# Try find [pam] and offline_credentials_expiration in sssd.conf, if it exists
# set it to 1, if it doesn't exist add it, if [pam] section doesn't exist add
# the section and the configuration option.
if grep -qzosP $PAM_OPT_REGEX $SSSD_CONF; then
	sed -i "s/${SSSD_OPT}[^(\n)]*/${SSSD_OPT} = ${SSSD_OPT_VAL}/" $SSSD_CONF
elif grep -qs $PAM_REGEX $SSSD_CONF; then
	sed -i "/$PAM_REGEX/a ${SSSD_OPT} = ${SSSD_OPT_VAL}" $SSSD_CONF
else
	mkdir -p /etc/sssd
	touch $SSSD_CONF
	echo -e "[pam]\n${SSSD_OPT} = ${SSSD_OPT_VAL}" &gt;&gt; $SSSD_CONF
fi
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-sssd_offline_cred_expiration:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_sssd-ldap">
            <title xml:lang="en-US">System Security Services Daemon (SSSD) - LDAP</title>
            <description xml:lang="en-US">The System Security Services Daemon (SSSD) is a system daemon that provides access
to different identity and authentication providers such as Red Hat's IdM, Microsoft's AD,
openLDAP, MIT Kerberos, etc. It uses a common framework that can provide caching and offline
support to systems utilizing SSSD. SSSD using caching to reduce load on authentication
servers permit offline authentication as well as store extended user data.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
SSSD can support many backends including LDAP. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">sssd-ldap</html:code> backend
allows SSSD to fetch identity information from an LDAP server.</description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_var_sssd_ldap_tls_ca_dir" type="string">
              <title xml:lang="en-US">SSSD LDAP Backend Client CA Certificate Location</title>
              <description xml:lang="en-US">Path of a directory that contains Certificate Authority certificates.</description>
              <value>/etc/openldap/cacerts</value>
            </Value>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_xwindows">
          <title xml:lang="en-US">X Window System</title>
          <description xml:lang="en-US">The X Window System implementation included with the
system is called X.org.</description>
          <Group id="xccdf_org.ssgproject.content_group_disabling_xwindows">
            <title xml:lang="en-US">Disable X Windows</title>
            <description xml:lang="en-US">Unless there is a mission-critical reason for the
system to run a graphical user interface, ensure X is not set to start
automatically at boot and remove the X Windows software packages.
There is usually no reason to run X Windows
on a dedicated server system, as it increases the system's attack surface and consumes
system resources. Administrators of server systems should instead login via
SSH or on the text console.</description>
          </Group>
        </Group>
      </Group>
      <Group id="xccdf_org.ssgproject.content_group_system">
        <title xml:lang="en-US">System Settings</title>
        <description xml:lang="en-US">Contains rules that check correct system settings.</description>
        <Group id="xccdf_org.ssgproject.content_group_accounts">
          <title xml:lang="en-US">Account and Access Control</title>
          <description xml:lang="en-US">In traditional Unix security, if an attacker gains
shell access to a certain login account, they can perform any action
or access any file to which that account has access. Therefore,
making it more difficult for unauthorized people to gain shell
access to accounts, particularly to privileged accounts, is a
necessary part of securing a system. This section introduces
mechanisms for restricting access to accounts under
SUSE Linux Enterprise 12.</description>
          <Group id="xccdf_org.ssgproject.content_group_accounts-banners">
            <title xml:lang="en-US">Warning Banners for System Accesses</title>
            <description xml:lang="en-US">Each system should expose as little information about
itself as possible.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
System banners, which are typically displayed just before a
login prompt, give out information about the service or the host's
operating system. This might include the distribution name and the
system kernel version, and the particular version of a network
service. This information can assist intruders in gaining access to
the system as it can reveal whether the system is running
vulnerable software. Most network services can be configured to
limit what information is displayed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Many organizations implement security policies that require a
system banner provide notice of the system's ownership, provide
warning to unauthorized users, and remind authorized users of their
consent to monitoring.</description>
            <Value id="xccdf_org.ssgproject.content_value_login_banner_text" type="string">
              <title xml:lang="en-US">Login Banner Verbiage</title>
              <description xml:lang="en-US">Enter an appropriate login banner for your organization. Please note that new lines must
be expressed by the '\n' character and special characters like parentheses and quotation marks must be escaped with '\'.</description>
              <value selector="dod_banners">^(You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:(\\n)*(\n)*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.(\\n)*(\n)*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.(\\n)*(\n)*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.(\\n)*(\n)*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests--not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.(\\n)*(\n)*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.|I\'ve[\s\n]+read[\s\n]+\&amp;[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreem\'t$)</value>
              <value selector="dod_default">You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:(\\n)*(\n)*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.(\\n)*(\n)*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.(\\n)*(\n)*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.(\\n)*(\n)*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests--not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.(\\n)*(\n)*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.</value>
              <value selector="dod_short">I(\\\')*(\')*ve[\s\n]+read[\s\n]+\&amp;[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreement.</value>
              <value selector="dss_odaa_default">[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.[\s\n]+This[\s\n]+is[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+and[\s\n]+related[\s\n]+equipment[\s\n]+are[\s\n]+intended[\s\n]+for[\s\n]+the[\s\n]+communication,[\s\n]+transmission,[\s\n]+processing,[\s\n]+and[\s\n]+storage[\s\n]+of[\s\n]+official[\s\n]+U.S.[\s\n]+Government[\s\n]+or[\s\n]+other[\s\n]+authorized[\s\n]+information[\s\n]+only.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times[\s\n]+to[\s\n]+ensure[\s\n]+proper[\s\n]+functioning[\s\n]+of[\s\n]+equipment[\s\n]+and[\s\n]+systems[\s\n]+including[\s\n]+security[\s\n]+devices[\s\n]+and[\s\n]+systems,[\s\n]+to[\s\n]+prevent[\s\n]+unauthorized[\s\n]+use[\s\n]+and[\s\n]+violations[\s\n]+of[\s\n]+statutes[\s\n]+and[\s\n]+security[\s\n]+regulations,[\s\n]+to[\s\n]+deter[\s\n]+criminal[\s\n]+activity,[\s\n]+and[\s\n]+for[\s\n]+other[\s\n]+similar[\s\n]+purposes.[\s\n]+Any[\s\n]+user[\s\n]+of[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+should[\s\n]+be[\s\n]+aware[\s\n]+that[\s\n]+any[\s\n]+information[\s\n]+placed[\s\n]+in[\s\n]+the[\s\n]+system[\s\n]+is[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+not[\s\n]+subject[\s\n]+to[\s\n]+any[\s\n]+expectation[\s\n]+of[\s\n]+privacy.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+violation[\s\n]+of[\s\n]+criminal[\s\n]+statutes,[\s\n]+this[\s\n]+evidence[\s\n]+and[\s\n]+any[\s\n]+other[\s\n]+related[\s\n]+information,[\s\n]+including[\s\n]+identification[\s\n]+information[\s\n]+about[\s\n]+the[\s\n]+user,[\s\n]+may[\s\n]+be[\s\n]+provided[\s\n]+to[\s\n]+law[\s\n]+enforcement[\s\n]+officials.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+reveals[\s\n]+violations[\s\n]+of[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+unauthorized[\s\n]+use,[\s\n]+employees[\s\n]+who[\s\n]+violate[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+make[\s\n]+unauthorized[\s\n]+use[\s\n]+of[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+appropriate[\s\n]+disciplinary[\s\n]+action.[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.</value>
              <value selector="usgcb_default">--[\s\n]+WARNING[\s\n]+--[\s\n]*This[\s\n]+system[\s\n]+is[\s\n]+for[\s\n]+the[\s\n]+use[\s\n]+of[\s\n]+authorized[\s\n]+users[\s\n]+only.[\s\n]+Individuals[\s\n]*using[\s\n]+this[\s\n]+computer[\s\n]+system[\s\n]+without[\s\n]+authority[\s\n]+or[\s\n]+in[\s\n]+excess[\s\n]+of[\s\n]+their[\s\n]*authority[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+having[\s\n]+all[\s\n]+their[\s\n]+activities[\s\n]+on[\s\n]+this[\s\n]+system[\s\n]*monitored[\s\n]+and[\s\n]+recorded[\s\n]+by[\s\n]+system[\s\n]+personnel.[\s\n]+Anyone[\s\n]+using[\s\n]+this[\s\n]*system[\s\n]+expressly[\s\n]+consents[\s\n]+to[\s\n]+such[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+advised[\s\n]+that[\s\n]*if[\s\n]+such[\s\n]+monitoring[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+criminal[\s\n]+activity[\s\n]*system[\s\n]+personal[\s\n]+may[\s\n]+provide[\s\n]+the[\s\n]+evidence[\s\n]+of[\s\n]+such[\s\n]+monitoring[\s\n]+to[\s\n]+law[\s\n]*enforcement[\s\n]+officials.</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="false" severity="medium">
              <title xml:lang="en-US">Modify the System Login Banner</title>
              <description xml:lang="en-US">To configure the system login banner edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/issue</html:code>. Replace the
default text with a message compliant with the local site policy or a legal
disclaimer.

The DoD required text is either:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">You are accessing a U.S. Government (USG) Information System (IS) that
is provided for USG-authorized use only. By using this IS (which includes
any device attached to this IS), you consent to the following conditions:
<html:br/>-The USG routinely intercepts and monitors communications on this IS
for purposes including, but not limited to, penetration testing, COMSEC
monitoring, network operations and defense, personnel misconduct (PM), law
enforcement (LE), and counterintelligence (CI) investigations.
<html:br/>-At any time, the USG may inspect and seize data stored on this IS.
<html:br/>-Communications using, or data stored on, this IS are not private,
are subject to routine monitoring, interception, and search, and may be
disclosed or used for any USG-authorized purpose.
<html:br/>-This IS includes security measures (e.g., authentication and access
controls) to protect USG interests -- not for your personal benefit or
privacy.
<html:br/>-Notwithstanding the above, using this IS does not constitute consent
to PM, LE or CI investigative searching or monitoring of the content of
privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and
their assistants. Such communications and work product are private and
confidential. See User Agreement for details.</html:code>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
OR:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">I've read &amp; consent to terms in IS user agreem't.</html:code></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.7.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.9</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000050</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(3)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000023-GPOS-00006</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000024-GPOS-00007</reference>
              <reference href="">SRG-OS-000023-VMM-000060</reference>
              <reference href="">SRG-OS-000024-VMM-000070</reference>
              <rationale xml:lang="en-US">Display of a standardized and approved use notification before granting
access to the operating system ensures privacy and security notification
verbiage used is consistent with applicable federal laws, Executive Orders,
directives, policies, regulations, standards, and guidance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
System use notifications are required only for access via login interfaces
with human users and are not required when such human interfaces do not
exist.</rationale>
              <fix id="banner_etc_issue" system="urn:xccdf:fix:script:sh">
login_banner_text="<sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy"/>"

# There was a regular-expression matching various banners, needs to be expanded
expanded=$(echo "$login_banner_text" | sed 's/(\\\\\x27)\*/\\\x27/g;s/(\\\x27)\*//g;s/\^(\(.*\)|.*$/\1/g;s/\[\\s\\n\][+*]/ /g;s/\\//g;s/[^-]- /\n\n-/g;s/(n)\**//g')
formatted=$(echo "$expanded" | fold -sw 80)

cat &lt;&lt;EOF &gt;/etc/issue
$formatted
EOF

printf "\n" &gt;&gt; /etc/issue
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                <check-content-ref name="oval:ssg-banner_etc_issue:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-banner_etc_issue_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_banner_etc_motd" selected="false" severity="medium">
              <version>SLES-12-010030</version>
              <title xml:lang="en-US">Modify the System Login Banner for Console Access</title>
              <description xml:lang="en-US">To configure the system login banner edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/motd</html:code>. Replace the
default text with a message compliant with the local site policy or a legal
disclaimer.

The DoD required text is either:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">You are accessing a U.S. Government (USG) Information System (IS) that
is provided for USG-authorized use only. By using this IS (which includes
any device attached to this IS), you consent to the following conditions:
<html:br/>-The USG routinely intercepts and monitors communications on this IS
for purposes including, but not limited to, penetration testing, COMSEC
monitoring, network operations and defense, personnel misconduct (PM), law
enforcement (LE), and counterintelligence (CI) investigations.
<html:br/>-At any time, the USG may inspect and seize data stored on this IS.
<html:br/>-Communications using, or data stored on, this IS are not private,
are subject to routine monitoring, interception, and search, and may be
disclosed or used for any USG-authorized purpose.
<html:br/>-This IS includes security measures (e.g., authentication and access
controls) to protect USG interests -- not for your personal benefit or
privacy.
<html:br/>-Notwithstanding the above, using this IS does not constitute consent
to PM, LE or CI investigative searching or monitoring of the content of
privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and
their assistants. Such communications and work product are private and
confidential. See User Agreement for details.</html:code>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
OR:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">I've read &amp; consent to terms in IS user agreem't.</html:code></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010030</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91747r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(3)</reference>
              <rationale xml:lang="en-US">Display of a standardized and approved use notification before granting
access to the operating system ensures privacy and security notification
verbiage used is consistent with applicable federal laws, Executive Orders,
directives, policies, regulations, standards, and guidance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
System use notifications are required only for access via login interfaces
with human users and are not required when such human interfaces do not
exist.</rationale>
              <fix id="banner_etc_motd" system="urn:xccdf:fix:script:sh">
login_banner_text="<sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy"/>"

# There was a regular-expression matching various banners, needs to be expanded
expanded=$(echo "$login_banner_text" | sed 's/(\\\\\x27)\*/\\\x27/g;s/(\\\x27)\*//g;s/\^(\(.*\)|.*$/\1/g;s/\[\\s\\n\][+*]/ /g;s/\\//g;s/[^-]- /\n\n-/g;s/(n)\**//g')
formatted=$(echo "$expanded" | fold -sw 80)

cat &lt;&lt;EOF &gt;/etc/motd
$formatted
EOF

printf "\n" &gt;&gt; /etc/motd
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                <check-content-ref name="oval:ssg-banner_etc_motd:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-banner_etc_motd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_gui_login_banner">
              <title xml:lang="en-US">Implement a GUI Warning Banner</title>
              <description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen provided
by the GNOME Display Manager (GDM). The warning banner should be
displayed in this graphical environment for these users.
The following sections describe how to configure the GDM login
banner.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_banner_enabled" selected="false" severity="medium">
                <version>SLES-12-010040</version>
                <title xml:lang="en-US">Enable GNOME3 Login Warning Banner</title>
                <description xml:lang="en-US">In the default graphical environment, displaying a login warning banner
in the GNOME Display Manager's login screen can be enabled on the login
screen by setting <html:code xmlns:html="http://www.w3.org/1999/xhtml">banner-message-enable</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">true</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To enable, add or edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">banner-message-enable</html:code> to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/gdm.d/00-security-settings</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/login-screen]
banner-message-enable=true</html:pre>
Once the setting has been added, add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/gdm.d/locks/00-security-settings-lock</html:code> to prevent user modification.
For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/login-screen/banner-message-enable</html:pre>
After the settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.
The banner text must also be set.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010040</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91749r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.7.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.9</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)(3)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
                <reference href="">OS-SRG-000023-GPOS-00006</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000024-GPOS-00007</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000228-GPOS-00088</reference>
                <rationale xml:lang="en-US">Display of a standardized and approved use notification before granting access to the operating system
ensures privacy and security notification verbiage used is consistent with applicable federal laws,
Executive Orders, directives, policies, regulations, standards, and guidance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For U.S. Government systems, system use notifications are required only for access via login interfaces
with human users and are not required when such human interfaces do not exist.</rationale>
                <fix id="dconf_gnome_banner_enabled" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_include_dconf_settings" use="legacy"/>
include_dconf_settings

dconf_settings 'org/gnome/login-screen' 'banner-message-enable' 'true' 'gdm.d' '00-security-settings'
dconf_lock 'org/gnome/login-screen' 'banner-message-enable' 'gdm.d' '00-security-settings-lock'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-dconf_gnome_banner_enabled:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_banner_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_login_banner_text" selected="false" severity="medium">
                <version>SLES-12-010050</version>
                <title xml:lang="en-US">Set the GNOME3 Login Warning Banner Text</title>
                <description xml:lang="en-US">In the default graphical environment, configuring the login warning banner text
in the GNOME Display Manager's login screen can be configured on the login
screen by setting <html:code xmlns:html="http://www.w3.org/1999/xhtml">banner-message-text</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">string '<html:i>APPROVED_BANNER</html:i>'</html:code>
where <html:i xmlns:html="http://www.w3.org/1999/xhtml">APPROVED_BANNER</html:i> is the approved banner for your environment.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To enable, add or edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">banner-message-text</html:code> to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/gdm.d/00-security-settings</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/login-screen]
banner-message-text='<html:i>APPROVED_BANNER</html:i>'</html:pre>
Once the setting has been added, add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/gdm.d/locks/00-security-settings-lock</html:code> to prevent user modification.
For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/login-screen/banner-message-text</html:pre>
After the settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.
When entering a warning banner that spans several lines, remember
to begin and end the string with <html:code xmlns:html="http://www.w3.org/1999/xhtml">'</html:code> and use <html:code xmlns:html="http://www.w3.org/1999/xhtml">\n</html:code> for new lines.</description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001384</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001385</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001386</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001387</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001388</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010050</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91751r4_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.7.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.9</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000023-GPOS-00006</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000024-GPOS-00007</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000228-GPOS-00088</reference>
                <rationale xml:lang="en-US">An appropriate warning message reinforces policy awareness during the logon
process and facilitates possible legal action against attackers.</rationale>
                <fix id="dconf_gnome_login_banner_text" system="urn:xccdf:fix:script:sh">
login_banner_text="<sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_include_dconf_settings" use="legacy"/>
include_dconf_settings

expanded=$(echo "$login_banner_text" | sed 's/(\\\\\x27)\*/\\\x27/g;s/(\\\x27)\*//g;s/(\\\\\x27)/tamere/g;s/\^(\(.*\)|.*$/\1/g;s/\[\\s\\n\][+*]/ /g;s/\\//g;s/(n)\*/\\n/g;s/\x27/\\\x27/g;s/\\n/\\\\n/g')

dconf_settings 'org/gnome/login-screen' 'banner-message-text' "string '${expanded}'" 'gdm.d' '00-security-settings'
dconf_lock 'org/gnome/login-screen' 'banner-message-text' 'gdm.d' '00-security-settings-lock'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                  <check-content-ref name="oval:ssg-dconf_gnome_login_banner_text:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_login_banner_text_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="false" severity="medium">
                <title xml:lang="en-US">Enable GUI Warning Banner</title>
                <description xml:lang="en-US">To enable displaying a login warning banner in the GNOME
Display Manager's login screen, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/gdm/simple-greeter/banner_message_enable true</html:pre>
To display a banner, this setting must be enabled and then
banner text must also be set.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <rationale xml:lang="en-US">An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="false" severity="medium">
                <title xml:lang="en-US">Set GUI Warning Banner Text</title>
                <description xml:lang="en-US">To set the text shown by the GNOME Display Manager
in the login screen, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type string \
  --set /apps/gdm/simple-greeter/banner_message_text \
  "Text of the warning banner here"</html:pre>
When entering a warning banner that spans several lines, remember
to begin and end the string with <html:code xmlns:html="http://www.w3.org/1999/xhtml">"</html:code>. This command writes
directly either to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</html:code>
if it exists or to the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</html:code>.
Either of these files can later be edited directly if necessary.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <rationale xml:lang="en-US">An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gui_login_dod_acknowledgement" selected="false" severity="medium">
                <version>SLES-12-010020</version>
                <title xml:lang="en-US">Display the Standard Mandatory DoD Notice and Consent Banner until Explicit Acknowledgement</title>
                <description xml:lang="en-US">Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

The banner must be acknowledged by the user prior to allowing the user access to the SUSE operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

System use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for the SUSE operating system:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.

By using this IS (which includes any device attached to this IS), you consent to the following conditions:

-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.

-At any time, the USG may inspect and seize data stored on this IS.

-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.

-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.

-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.</html:pre>

Check the configuration by running the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># more /etc/gdm/Xsession</html:pre>

The beginning of the file must contain the following text immediately after <html:code xmlns:html="http://www.w3.org/1999/xhtml">#!/bin/sh</html:code>:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">if ! zenity --text-info \
--title "Consent" \
--filename=/etc/gdm/banner \
--no-markup \
--checkbox="Accept." 10 10; then
sleep 1;
exit 1;
fi</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010020</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91745r3_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000048</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000050</reference>
                <rationale xml:lang="en-US">Display of a standardized and approved use notification before granting access to the operating system
ensures privacy and security notification verbiage used is consistent with applicable federal laws,
Executive Orders, directives, policies, regulations, standards, and guidance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For U.S. Government systems, system use notifications are required only for access via login interfaces
with human users and are not required when such human interfaces do not exist.</rationale>
                <fix id="gui_login_dod_acknowledgement" system="urn:xccdf:fix:script:sh">
if ! [ -x /etc/gdm/Xsession ] ; then
    echo "can only remediate if /etc/gdm/Xsession is an executable shell script" &gt;&amp;2
    exit 1
fi

if ! awk 'NR==1 &amp;&amp; $0 == "#!/bin/sh" { exit 0 } ; { exit 1 }' /etc/gdm/Xsession ; then
    echo "can only remediate if /etc/gdm/Xsession is a shell script" &gt;&amp;2
    exit 1
fi

f=$(mktemp)

echo '#!/bin/sh

if ! zenity --text-info \
 --title "Consent" \
 --filename=/etc/gdm/banner \
 --no-markup \
 --checkbox="Accept." 10 10; then
  sleep 1;
  exit 1;
fi
' &gt; "$f"

# copy original contents of /etc/gdm/Xsession - but skip the shebang
tail -n +2 /etc/gdm/Xsession &gt;&gt; "$f"

chown --reference=/etc/gdm/Xsession "$f"
chmod --reference=/etc/gdm/Xsession "$f"
mv "$f" /etc/gdm/Xsession
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-gui_login_dod_acknowledgement:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gui_login_dod_acknowledgement_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_banner_etc_gdm_banner" selected="false" severity="medium">
                <version>SLES-12-030020</version>
                <title xml:lang="en-US">Modify the System GUI Login Banner</title>
                <description xml:lang="en-US">To configure the GUI system login banner edit <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gdm/banner</html:code>.
Replace the default text with a message compliant with the local site
policy or a legal disclaimer.

The DoD required text is either:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">You are accessing a U.S. Government (USG) Information System (IS) that
is provided for USG-authorized use only. By using this IS (which includes
any device attached to this IS), you consent to the following conditions:
<html:br/>-The USG routinely intercepts and monitors communications on this IS
for purposes including, but not limited to, penetration testing, COMSEC
monitoring, network operations and defense, personnel misconduct (PM), law
enforcement (LE), and counterintelligence (CI) investigations.
<html:br/>-At any time, the USG may inspect and seize data stored on this IS.
<html:br/>-Communications using, or data stored on, this IS are not private,
are subject to routine monitoring, interception, and search, and may be
disclosed or used for any USG-authorized purpose.
<html:br/>-This IS includes security measures (e.g., authentication and access
controls) to protect USG interests -- not for your personal benefit or
privacy.
<html:br/>-Notwithstanding the above, using this IS does not constitute consent
to PM, LE or CI investigative searching or monitoring of the content of
privileged communications, or work product, related to personal
representation or services by attorneys, psychotherapists, or clergy, and
their assistants. Such communications and work product are private and
confidential. See User Agreement for details.</html:code>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
OR:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:code xmlns:html="http://www.w3.org/1999/xhtml">I've read &amp; consent to terms in IS user agreem't.</html:code></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030020</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92129r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000050</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</reference>
                <rationale xml:lang="en-US">Display of a standardized and approved use notification before granting
access to the operating system ensures privacy and security notification
verbiage used is consistent with applicable federal laws, Executive Orders,
directives, policies, regulations, standards, and guidance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
System use notifications are required only for access via login interfaces
with human users and are not required when such human interfaces do not
exist.</rationale>
                <fix id="banner_etc_gdm_banner" system="urn:xccdf:fix:script:sh">
login_banner_text="<sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy"/>"

# There was a regular-expression matching various banners, needs to be expanded
expanded=$(echo "$login_banner_text" | sed 's/(\\\\\x27)\*/\\\x27/g;s/(\\\x27)\*//g;s/\^(\(.*\)|.*$/\1/g;s/\[\\s\\n\][+*]/ /g;s/\\//g;s/[^-]- /\n\n-/g;s/(n)\**//g')
formatted=$(echo "$expanded" | fold -sw 80)

cat &lt;&lt;EOF &gt;/etc/gdm/banner
$formatted

EOF

chmod 0644 /etc/gdm/banner
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text"/>
                  <check-content-ref name="oval:ssg-banner_etc_gdm_banner:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-banner_etc_gdm_banner_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_accounts-pam">
            <title xml:lang="en-US">Protect Accounts by Configuring PAM</title>
            <description xml:lang="en-US">PAM, or Pluggable Authentication Modules, is a system
which implements modular authentication for Linux programs. PAM provides
a flexible and configurable architecture for authentication, and it should be configured
to minimize exposure to unnecessary risk. This section contains
guidance on how to accomplish that.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
PAM is implemented as a set of shared objects which are
loaded and invoked whenever an application wishes to authenticate a
user. Typically, the application must be running as root in order
to take advantage of PAM, because PAM's modules often need to be able
to access sensitive stores of account information, such as /etc/shadow.
Traditional privileged network listeners
(e.g. sshd) or SUID programs (e.g. sudo) already meet this
requirement. An SUID root application, userhelper, is provided so
that programs which are not SUID or privileged themselves can still
take advantage of PAM.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
PAM looks in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d</html:code> for
application-specific configuration information. For instance, if
the program login attempts to authenticate a user, then PAM's
libraries follow the instructions in the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/login</html:code>
to determine what actions should be taken.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
One very important file in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d</html:code> is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code>. This file, which is included by
many other PAM configuration files, defines 'default' system authentication
measures. Modifying this file is a good way to make far-reaching
authentication changes, for instance when implementing a
centralized authentication service.</description>
            <warning xml:lang="en-US" category="functionality">Be careful when making changes to PAM's configuration files.
The syntax for these files is complex, and modifications can
have unexpected consequences. The default configurations shipped
with applications should be sufficient for most users.</warning>
            <warning xml:lang="en-US" category="functionality">Running <html:code xmlns:html="http://www.w3.org/1999/xhtml">authconfig</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">system-config-authentication</html:code>
will re-write the PAM configuration files, destroying any manually
made changes and replacing them with a series of system defaults.
One reference to the configuration file syntax can be found at

<html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://www.linux-pam.org/Linux-PAM-html/sag-configuration-file.html">http://www.linux-pam.org/Linux-PAM-html/sag-configuration-file.html</html:a>.</warning>
            <Value id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" type="number">
              <title xml:lang="en-US">remember</title>
              <description xml:lang="en-US">The last n passwords for each user are saved in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/opasswd</html:code> in order to force password change history and
keep the user from alternating between the same password too
frequently.</description>
              <value selector="0">0</value>
              <value selector="10">10</value>
              <value selector="24">24</value>
              <value selector="4">4</value>
              <value selector="5">5</value>
              <value>5</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="false" severity="low">
              <version>SLES-12-010390</version>
              <title xml:lang="en-US">Ensure PAM Displays Last Logon/Access Notification</title>
              <description xml:lang="en-US">To configure the system to notify users of last logon/access
using <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_lastlog</html:code>, add or correct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_lastlog</html:code> settings in

<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/login</html:code> to read as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">session     required pam_lastlog.so showfailed</html:pre>
And make sure that, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">silent</html:code> option is not set.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010390</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91831r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-9</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Users need to be aware of activity that occurs regarding
their account. Providing users with information regarding the number
of unsuccessful attempts that were made to login to their account
allows the user to determine if any unauthorized activity has occurred
and gives them an opportunity to notify administrators.</rationale>
              <platform idref="cpe:/a:pam"/>
              <fix id="display_login_attempts" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/login' 'session' 'required' 'pam_lastlog.so' 'showfailed' "" ""

# remove 'silent' option
sed -i --follow-symlinks -E -e 's/^([^#]+pam_lastlog\.so[^#]*)\ssilent/\1/' '/etc/pam.d/login'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-display_login_attempts:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-display_login_attempts_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_faildelay" selected="false" severity="medium">
              <version>SLES-12-010370</version>
              <title xml:lang="en-US">Enforce Delay After Failed Logon Attempts</title>
              <description xml:lang="en-US">To configure the system to introduce a delay after failed logon attempts,
add or correct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_faildelay</html:code> settings in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-auth</html:code> to read as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">auth required pam_faildelay.so delay=<sub idref="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" use="legacy"/>000000</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010370</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91827r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6.1(iv)</reference>
              <rationale xml:lang="en-US">Limiting the number of logon attempts over a certain time interval reduces
the chances that an unauthorized user may gain access to an account.</rationale>
              <fix id="faildelay" system="urn:xccdf:fix:script:sh">
var_accounts_fail_delay="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" use="legacy"/>"

# convert to microseconds
delay=$((var_accounts_fail_delay*1000000))
<sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-auth' 'auth' 'required' 'pam_faildelay.so' 'delay' "$delay" "$delay"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_accounts_fail_delay:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_fail_delay"/>
                <check-content-ref name="oval:ssg-faildelay:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-faildelay_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_pam_disable_automatic_configuration" selected="false" severity="medium">
              <version>SLES-12-010910</version>
              <title xml:lang="en-US">The PAM configuration should not be changed automatically</title>
              <description xml:lang="en-US">Verify the SUSE operating system is configured to not overwrite Pluggable
Authentication Modules (PAM) configuration on package changes.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010910</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91981r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6.1(iv)</reference>
              <rationale xml:lang="en-US"><html:code xmlns:html="http://www.w3.org/1999/xhtml">pam-config</html:code> is a command line utility that automatically generates
a system PAM configuration as packages are installed, updated or removed
from the system. <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam-config</html:code> removes configurations for PAM modules
and parameters that it does not know about. It may render ineffective PAM
configuration by the system administrator and thus impact system security.</rationale>
              <fix id="pam_disable_automatic_configuration" system="urn:xccdf:fix:script:sh">
for link in $(find /etc/pam.d/ -type l -iname "common-*") ; do
    target=$(readlink -f "$link")
    cp -p --remove-destination "$target" "$link"
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-pam_disable_automatic_configuration:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-pam_disable_automatic_configuration_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_locking_out_password_attempts">
              <title xml:lang="en-US">Set Lockouts for Failed Password Attempts</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_faillock</html:code> PAM module provides the capability to
lock out user accounts after a number of failed login attempts. Its
documentation is available in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/share/doc/pam-VERSION/txts/README.pam_faillock</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
              <warning xml:lang="en-US" category="general">Locking out user accounts presents the
risk of a denial-of-service attack. The lockout policy
must weigh whether the risk of such a
denial-of-service attack outweighs the benefits of thwarting
password guessing attacks.</warning>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="false" severity="medium">
                <version>SLES-12-010310</version>
                <title xml:lang="en-US">Limit Password Reuse</title>
                <description xml:lang="en-US">Do not allow users to reuse recent passwords. This can be
accomplished by using the <html:code xmlns:html="http://www.w3.org/1999/xhtml">remember</html:code> option for the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_unix</html:code>
or <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwhistory</html:code> PAM modules.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

In the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-password</html:code>, append <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">remember=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy"/> use_authtok</html:code>
to the line which refers to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwhistory.so</html:code>module, as shown below:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">password requisite pam_pwhistory.so <html:i>...existing_options...</html:i> remember=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy"/> use_authtok</html:pre>

The DoD STIG requirement is 5 passwords.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010310</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91817r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.3.3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.8</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000200</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(e)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000077-GPOS-00045</reference>
                <reference href="">SRG-OS-000077-VMM-000440</reference>
                <rationale xml:lang="en-US">Preventing re-use of previous passwords helps ensure that a compromised password is not re-used by a user.</rationale>
                <platform idref="cpe:/a:pam"/>
                <fix id="accounts_password_pam_unix_remember" system="urn:xccdf:fix:script:sh">
var_password_pam_unix_remember="<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_pwhistory.so' 'remember' "$var_password_pam_unix_remember" "$var_password_pam_unix_remember"
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_pwhistory.so' 'use_authtok' '' ''
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_password_pam_unix_remember:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember"/>
                  <check-content-ref name="oval:ssg-accounts_password_pam_unix_remember:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_tally2" selected="false" severity="medium">
                <version>SLES-12-010130</version>
                <title xml:lang="en-US">Set Deny For Failed Password Attempts</title>
                <description xml:lang="en-US">The SUSE operating system must lock an account after three consecutive invalid logon attempts.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010130</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91767r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000044</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(a)</reference>
                <rationale xml:lang="en-US">By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Check that the systems locks a user account after three consecutive failed login attempts with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep pam_tally2.so /etc/pam.d/common-auth
auth required pam_tally2.so deny=3

# grep pam_tally2.so /etc/pam.d/common-account
account required pam_tally2.so deny=3</html:pre>

If the "deny" option in one of the files is greater than "<html:code xmlns:html="http://www.w3.org/1999/xhtml">3</html:code>" or is missing, this is a finding.</rationale>
                <fix id="accounts_passwords_pam_tally2" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-auth' 'auth' 'required' 'pam_tally2.so' 'deny' '[123]' '3'
ensure_pam_module_options '/etc/pam.d/common-account' 'account' 'required' 'pam_tally2.so' 'deny' '[123]' '3'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-accounts_passwords_pam_tally2:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_passwords_pam_tally2_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_password_quality">
              <title xml:lang="en-US">Set Password Quality Requirements</title>
              <description xml:lang="en-US">The default <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> PAM module provides strength
checking for passwords. It performs a number of checks, such as
making sure passwords are not similar to dictionary words, are of
at least a certain length, are not the previous password reversed,
and are not simply a change of case from the previous password. It
can also require passwords to be in certain character classes. The
<html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> module is the preferred way of configuring
password requirements.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_cracklib</html:code> PAM module can also provide strength
checking for passwords as the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> module.
It performs a number of checks, such as making sure passwords are
not similar to dictionary words, are of at least a certain length,
are not the previous password reversed, and are not simply a change
of case from the previous password. It can also require passwords to
be in certain character classes.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The man pages <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality(8)</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_cracklib(8)</html:code>
provide information on the capabilities and configuration of
each.</description>
              <Group id="xccdf_org.ssgproject.content_group_password_quality_pamcracklib">
                <title xml:lang="en-US">Set Password Quality Requirements, if using
pam_cracklib</title>
                <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_cracklib</html:code> PAM module can be configured to meet
requirements for a variety of policies.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For example, to configure <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_cracklib</html:code> to require at least one uppercase
character, lowercase character, digit, and other (special)
character, locate the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">password requisite pam_cracklib.so try_first_pass retry=3</html:pre>
and then alter it to read:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">password required pam_cracklib.so try_first_pass retry=3 maxrepeat=3 minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 difok=4</html:pre>
If no such line exists, add one as the first line of the password section in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code>.
The arguments can be modified to ensure compliance with
your organization's security policy. Discussion of each parameter follows.</description>
                <warning xml:lang="en-US" category="general">Note that the password quality requirements are not enforced for the
root account for some reason.</warning>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_dcredit" selected="false" severity="medium">
                  <version>SLES-12-010170</version>
                  <title xml:lang="en-US">Set Password Strength Minimum Digit Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">dcredit</html:code> parameter controls requirements
for usage of digits in a password. When set to a negative number, any
password will be required to contain that many digits. When set to a
positive number, pam_cracklib will grant +1 additional length credit for
each digit. Add <html:code xmlns:html="http://www.w3.org/1999/xhtml">dcredit=-1</html:code> after pam_cracklib.so to require use of
a digit in passwords.</description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000194</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(a)</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010170</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91775r3_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.3</reference>
                  <rationale xml:lang="en-US">Requiring digits makes password guessing attacks more difficult by ensuring a larger
search space.</rationale>
                  <fix id="cracklib_accounts_password_pam_dcredit" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'dcredit' '-1' '-1'
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_dcredit:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_dcredit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_difok" selected="false" severity="medium">
                  <version>SLES-12-010190</version>
                  <title xml:lang="en-US">Set Password Strength Minimum Different Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">difok</html:code> parameter controls requirements for
usage of different characters during a password change.
Add <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">difok=<html:i><sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy"/></html:i></html:code> after pam_cracklib.so to require differing
characters when changing passwords.</description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010190</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91783r3_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(b)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <rationale xml:lang="en-US">Requiring a minimum number of different characters during password changes ensures that
newly changed passwords should not resemble previously compromised ones.
Note that passwords which are changed on compromised systems will still be compromised, however.</rationale>
                  <fix id="cracklib_accounts_password_pam_difok" system="urn:xccdf:fix:script:sh">
var_password_pam_difok="<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'difok' "$var_password_pam_difok" "$var_password_pam_difok"
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-export export-name="oval:ssg-var_password_pam_difok:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_difok"/>
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_difok:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_difok_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_lcredit" selected="false" severity="medium">
                  <version>SLES-12-010160</version>
                  <title xml:lang="en-US">Set Password Strength Minimum Lowercase Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">lcredit=</html:code> parameter controls requirements for
usage of lowercase letters in a password. When set to a negative number, any password will be required to
contain that many lowercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each lowercase character.
Add <html:code xmlns:html="http://www.w3.org/1999/xhtml">lcredit=-1</html:code> after pam_cracklib.so to require use of a lowercase character in passwords.</description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010160</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91773r3_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.3</reference>
                  <rationale xml:lang="en-US">Requiring a minimum number of lowercase characters makes password guessing attacks
more difficult by ensuring a larger search space.</rationale>
                  <fix id="cracklib_accounts_password_pam_lcredit" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'lcredit' '-1' '-1'
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_lcredit:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_lcredit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_maxrepeat" selected="false" severity="unknown">
                  <title xml:lang="en-US">Set Password to Maximum of Three Consecutive Repeating Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">maxrepeat</html:code> parameter controls requirements for
consecutive repeating characters. When set to a positive number, it will reject passwords
which contain more than that number of consecutive characters. Add <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">maxrepeat=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy"/></html:code>
after pam_cracklib.so to prevent a run of (<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy"/> + 1) or more identical characters:<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">password required pam_cracklib.so maxrepeat=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy"/></html:pre></description>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <rationale xml:lang="en-US">Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.</rationale>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_maxrepeat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_minclass" selected="false" severity="unknown">
                  <title xml:lang="en-US">Set Password Strength Minimum Different Categories</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">minclass</html:code> parameter controls requirements for
usage of different character classes, or types, of character that must exist in a password
before it is considered valid. For example, setting this value to three (3) requires that
any password must have characters from at least three different categories in order to be
approved. The default value is zero (0), meaning there are no required classes. There are
four categories available:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
* Upper-case characters
* Lower-case characters
* Digits
* Special characters (for example, punctuation)
</html:pre>
Add <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">minclass=<html:i><sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy"/></html:i></html:code> after pam_cracklib.so entry into the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code> file in order to require <sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy"/>  differing categories of
characters when changing passwords.
For example to require at least three character classes to be used in password, use <html:code xmlns:html="http://www.w3.org/1999/xhtml">minclass=3</html:code>.</description>
                  <rationale xml:lang="en-US">Requiring a minimum number of character categories makes password guessing attacks
more difficult by ensuring a larger search space.</rationale>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_minclass_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_minlen" selected="false" severity="medium">
                  <version>SLES-12-010250</version>
                  <title xml:lang="en-US">Set Password Minimum Length</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">minlen</html:code> parameter controls requirements for
minimum characters required in a password. Add <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">minlen=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy"/></html:code>
after pam_pwquality to set minimum password length requirements.</description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000205</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010250</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91805r3_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.3</reference>
                  <rationale xml:lang="en-US">Password length is one factor of several that helps to determine
strength and how long it takes to crack a password. Use of more characters in
a password helps to exponentially increase the time and/or resources
required to compromise the password.</rationale>
                  <fix id="cracklib_accounts_password_pam_minlen" system="urn:xccdf:fix:script:sh">
var_password_pam_minlen="<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'minlen' "$var_password_pam_minlen" "$var_password_pam_minlen"
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-export export-name="oval:ssg-var_password_pam_minlen:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_minlen"/>
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_minlen:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_minlen_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_ocredit" selected="false" severity="medium">
                  <version>SLES-12-010180</version>
                  <title xml:lang="en-US">Set Password Strength Minimum Special Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">ocredit=</html:code> parameter controls requirements for
usage of special (or ``other'') characters in a password. When set to a negative number, any password will be required to
contain that many special characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each special character.
Add <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">ocredit=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" use="legacy"/></html:code> after pam_cracklib.so to require use of a special character in passwords.</description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001619</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010180</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91777r3_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <rationale xml:lang="en-US">Requiring a minimum number of special characters makes password guessing attacks
more difficult by ensuring a larger search space.</rationale>
                  <fix id="cracklib_accounts_password_pam_ocredit" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'ocredit' '-1' '-1'
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_ocredit:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_ocredit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_retry" selected="false" severity="unknown">
                  <title xml:lang="en-US">Set Password Retry Prompts Permitted Per-Session</title>
                  <description xml:lang="en-US">To configure the number of retry prompts that are permitted per-session:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Edit the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_cracklib.so</html:code> statement in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code> to show
<html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">retry=<sub idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" use="legacy"/></html:code>, or a lower value
if site policy is more restrictive.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The DoD requirement is a maximum of 3 prompts per session.</description>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <rationale xml:lang="en-US">Setting the password retry prompts that are permitted on a per-session basis to a low value
requires some software, such as SSH, to re-connect. This can slow down and
draw additional attention to some types of password-guessing attacks. Note that this
is different from account lockout, which is provided by the pam_faillock module.</rationale>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_retry_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_cracklib_accounts_password_pam_ucredit" selected="false" severity="medium">
                  <version>SLES-12-010150, SLES-12-010320</version>
                  <title xml:lang="en-US">Set Password Strength Minimum Uppercase Characters</title>
                  <description xml:lang="en-US">The pam_cracklib module's <html:code xmlns:html="http://www.w3.org/1999/xhtml">ucredit=</html:code> parameter controls requirements for
usage of uppercase letters in a password. When set to a negative number, any password will be required to
contain that many uppercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each uppercase character.
Add <html:code xmlns:html="http://www.w3.org/1999/xhtml">ucredit=-1</html:code> after pam_cracklib.so to require use of an upper case character in passwords.</description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000192</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010150</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91771r3_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010320</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91819r2_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.3</reference>
                  <rationale xml:lang="en-US">Requiring a minimum number of uppercase characters makes password guessing attacks
more difficult by ensuring a larger search space.</rationale>
                  <fix id="cracklib_accounts_password_pam_ucredit" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'requisite' 'pam_cracklib.so' 'ucredit' '-1' '-1'
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-cracklib_accounts_password_pam_ucredit:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-cracklib_accounts_password_pam_ucredit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_password_quality_pwquality">
                <title xml:lang="en-US">Set Password Quality Requirements with pam_pwquality</title>
                <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> PAM module can be configured to meet
requirements for a variety of policies.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For example, to configure <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> to require at least one uppercase
character, lowercase character, digit, and other (special)
character, make sure that <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code> exists in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=</html:pre>
If no such line exists, add one as the first line of the password section in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/system-auth</html:code>.
Next, modify the settings in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/pwquality.conf</html:code> to match the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">difok = 4
minlen = 14
dcredit = -1
ucredit = -1
lcredit = -1
ocredit = -1
maxrepeat = 3</html:pre>
The arguments can be modified to ensure compliance with
your organization's security policy. Discussion of each parameter follows.</description>
                <Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" type="number">
                  <title xml:lang="en-US">fail_deny</title>
                  <description xml:lang="en-US">Number of failed login attempts before account lockout</description>
                  <value selector="10">10</value>
                  <value selector="3">3</value>
                  <value selector="5">5</value>
                  <value selector="6">6</value>
                  <value>3</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" type="number">
                  <title xml:lang="en-US">fail_interval</title>
                  <description xml:lang="en-US">Interval for counting failed login attempts before account lockout</description>
                  <value selector="100000000">100000000</value>
                  <value selector="1800">1800</value>
                  <value selector="3600">3600</value>
                  <value selector="86400">86400</value>
                  <value selector="900">900</value>
                  <value>900</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" type="string">
                  <title xml:lang="en-US">fail_unlock_time</title>
                  <description xml:lang="en-US">Seconds before automatic unlocking or permanently locking after excessive failed logins</description>
                  <value selector="1800">1800</value>
                  <value selector="3600">3600</value>
                  <value selector="600">600</value>
                  <value selector="604800">604800</value>
                  <value selector="86400">86400</value>
                  <value selector="900">900</value>
                  <value>never</value>
                  <value selector="never">never</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" type="number">
                  <title xml:lang="en-US">dcredit</title>
                  <description xml:lang="en-US">Minimum number of digits in password</description>
                  <value selector="0">0</value>
                  <value selector="1">-1</value>
                  <value selector="2">-2</value>
                  <value>-1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" type="number">
                  <title xml:lang="en-US">lcredit</title>
                  <description xml:lang="en-US">Minimum number of lower case in password</description>
                  <value selector="0">0</value>
                  <value selector="1">-1</value>
                  <value selector="2">-2</value>
                  <value>-1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_maxclassrepeat" type="number">
                  <title xml:lang="en-US">maxclassrepeat</title>
                  <description xml:lang="en-US">Maximum Number of Consecutive Repeating Characters in a Password From the Same Character Class</description>
                  <value selector="1">1</value>
                  <value selector="2">2</value>
                  <value selector="3">3</value>
                  <value selector="4">4</value>
                  <value>4</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" type="number">
                  <title xml:lang="en-US">maxrepeat</title>
                  <description xml:lang="en-US">Maximum Number of Consecutive Repeating Characters in a Password</description>
                  <value selector="1">1</value>
                  <value selector="2">2</value>
                  <value selector="3">3</value>
                  <value>3</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_minclass" type="number">
                  <title xml:lang="en-US">minclass</title>
                  <description xml:lang="en-US">Minimum number of categories of characters that must exist in a password</description>
                  <value selector="1">1</value>
                  <value selector="2">2</value>
                  <value selector="3">3</value>
                  <value selector="4">4</value>
                  <value>3</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_minlen" type="number">
                  <title xml:lang="en-US">minlen</title>
                  <description xml:lang="en-US">Minimum number of characters in password</description>
                  <value selector="10">10</value>
                  <value selector="12">12</value>
                  <value selector="14">14</value>
                  <value selector="15">15</value>
                  <value selector="6">6</value>
                  <value selector="7">7</value>
                  <value selector="8">8</value>
                  <value>15</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" type="number">
                  <title xml:lang="en-US">ocredit</title>
                  <description xml:lang="en-US">Minimum number of other (special characters) in
password</description>
                  <value selector="0">0</value>
                  <value selector="1">-1</value>
                  <value selector="2">-2</value>
                  <value>-1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_retry" type="number">
                  <title xml:lang="en-US">retry</title>
                  <description xml:lang="en-US">Number of retry attempts before erroring out</description>
                  <value selector="1">1</value>
                  <value selector="2">2</value>
                  <value selector="3">3</value>
                  <value selector="4">4</value>
                  <value selector="5">5</value>
                  <value>3</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" type="number">
                  <title xml:lang="en-US">ucredit</title>
                  <description xml:lang="en-US">Minimum number of upper case in password</description>
                  <value selector="0">0</value>
                  <value selector="1">-1</value>
                  <value selector="2">-2</value>
                  <value>-1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_var_password_pam_difok" type="number">
                  <title xml:lang="en-US">difok</title>
                  <description xml:lang="en-US">Minimum number of characters not present in old
password</description>
                  <value selector="15">15</value>
                  <value selector="1">1</value>
                  <value selector="2">2</value>
                  <value selector="3">3</value>
                  <value selector="4">4</value>
                  <value selector="5">5</value>
                  <value selector="6">6</value>
                  <value selector="7">7</value>
                  <value selector="8">8</value>
                  <value>8</value>
                </Value>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_set_password_hashing_algorithm">
              <title xml:lang="en-US">Set Password Hashing Algorithm</title>
              <description xml:lang="en-US">The system's default algorithm for storing password hashes in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> is SHA-512. This can be configured in several
locations.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="false" severity="medium">
                <version>SLES-12-010210</version>
                <title xml:lang="en-US">Set Password Hashing Algorithm in /etc/login.defs</title>
                <description xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code>, add or correct the following line to ensure
the system will use SHA-512 as the hashing algorithm:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">ENCRYPT_METHOD SHA512</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010210</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91789r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.3.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.11</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000196</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000073-GPOS-00041</reference>
                <rationale xml:lang="en-US">Passwords need to be protected at all times, and encryption is the standard method for protecting passwords.
If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Passwords
that are encrypted with a weak algorithm are no more protected than if they are kept in plain text.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Using a stronger hashing algorithm makes password cracking attacks more difficult.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <fix id="set_password_hashing_algorithm_logindefs" system="urn:xccdf:fix:script:sh">if grep --silent ^ENCRYPT_METHOD /etc/login.defs ; then
	sed -i 's/^ENCRYPT_METHOD.*/ENCRYPT_METHOD SHA512/g' /etc/login.defs
else
	echo "" &gt;&gt; /etc/login.defs
	echo "ENCRYPT_METHOD SHA512" &gt;&gt; /etc/login.defs
fi
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="false" severity="medium">
                <version>SLES-12-010230</version>
                <title xml:lang="en-US">Set PAM's Password Hashing Algorithm</title>
                <description xml:lang="en-US">The PAM system service can be configured to only store encrypted
representations of passwords. In

<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-password</html:code>,

the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">password</html:code> section of the file controls which PAM modules execute
during a password change. Set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_unix.so</html:code> module in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">password</html:code> section to include the argument <html:code xmlns:html="http://www.w3.org/1999/xhtml">sha512</html:code>, as shown
below:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">password    required    pam_unix.so sha512 <html:i>other arguments...</html:i></html:pre>

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This will help ensure when local users change their passwords, hashes for
the new passwords will be generated using the SHA-512 algorithm. This is
the default.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010230</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91801r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.3.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.11</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000196</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000073-GPOS-00041</reference>
                <reference href="">SRG-OS-000480-VMM-002000</reference>
                <rationale xml:lang="en-US">Passwords need to be protected at all times, and encryption is the standard
method for protecting passwords. If passwords are not encrypted, they can
be plainly read (i.e., clear text) and easily compromised. Passwords that
are encrypted with a weak algorithm are no more protected than if they are
kepy in plain text.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This setting ensures user and group account administration utilities are
configured to store only encrypted representations of passwords.
Additionally, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">crypt_style</html:code> configuration option ensures the use
of a strong hashing algorithm that makes password cracking attacks more
difficult.</rationale>
                <platform idref="cpe:/a:pam"/>
                <fix id="set_password_hashing_algorithm_systemauth" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-password' 'password' 'required' 'pam_unix.so' 'sha512' '' ''
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_min_rounds_logindefs" selected="false" severity="medium">
                <version>SLES-12-010240</version>
                <title xml:lang="en-US">Set Password Hashing Rounds in /etc/login.defs</title>
                <description xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code>, remove or correct the following lines to ensure
the system will use a sufficient number of hashing rounds to store passwords:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">SHA_CRYPT_MIN_ROUNDS 5000
SHA_CRYPT_MAX_ROUNDS 5000</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010240</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91803r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000196</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <rationale xml:lang="en-US">Passwords need to be protected at all times, and encryption is the standard method for protecting passwords.
If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Passwords
that are encrypted with a weak algorithm are no more protected than if they are kept in plain text.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Using more hashing rounds makes password cracking attacks more difficult.</rationale>
                <fix id="set_password_hashing_min_rounds_logindefs" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/login.defs' '^SHA_CRYPT_MIN_ROUNDS' '5000' '' '%s %s'
replace_or_append '/etc/login.defs' '^SHA_CRYPT_MAX_ROUNDS' '5000' '' '%s %s'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-set_password_hashing_min_rounds_logindefs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_password_hashing_min_rounds_logindefs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_commonauth" selected="false" severity="medium">
                <version>SLES-12-010200</version>
                <title xml:lang="en-US">Set PAM's Password Hashing Algorithm for Logins</title>
                <description xml:lang="en-US">The PAM system service can be configured to only store encrypted
representations of passwords. In <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-auth</html:code>, the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">password</html:code> section of the file controls which PAM modules execute
during a password change. Set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_unix.so</html:code> module in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">password</html:code> section to include the argument <html:code xmlns:html="http://www.w3.org/1999/xhtml">sha512</html:code>, as shown
below:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">auth    required    pam_unix.so sha512 <html:i>other arguments...</html:i></html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This will help ensure when local users change their passwords, hashes for
the new passwords will be generated using the SHA-512 algorithm. This is
the default.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010200</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91785r3_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000120-GPOS-00061</reference>
                <rationale xml:lang="en-US">Passwords need to be protected at all times, and encryption is the standard
method for protecting passwords. If passwords are not encrypted, they can
be plainly read (i.e., clear text) and easily compromised. Passwords that
are encrypted with a weak algorithm are no more protected than if they are
kepy in plain text.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This setting ensures user and group account administration utilities are
configured to store only encrypted representations of passwords.
Additionally, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">crypt_style</html:code> configuration option ensures the use
of a strong hashing algorithm that makes password cracking attacks more
difficult.</rationale>
                <fix id="set_password_hashing_algorithm_commonauth" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_ensure_pam_module_options" use="legacy"/>
ensure_pam_module_options '/etc/pam.d/common-auth' 'auth' 'required' 'pam_unix.so' 'sha512' '' ''
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-set_password_hashing_algorithm_commonauth:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_password_hashing_algorithm_commonauth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_accounts-physical">
            <title xml:lang="en-US">Protect Physical Console Access</title>
            <description xml:lang="en-US">It is impossible to fully protect a system from an
attacker with physical access, so securing the space in which the
system is located should be considered a necessary step. However,
there are some steps which, if taken, make it more difficult for an
attacker to quickly or undetectably modify a system from its
console.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="false" severity="high">
              <version>SLES-12-010610</version>
              <title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Activation</title>
              <description xml:lang="en-US">
By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">SystemD</html:code> will reboot the system if the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code>
key sequence is pressed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To configure the system to ignore the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence from the
command line instead of rebooting the system, do either of the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">ln -sf /dev/null /etc/systemd/system/ctrl-alt-del.target</html:pre>
or
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">systemctl mask ctrl-alt-del.target</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Do not simply delete the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/lib/systemd/system/ctrl-alt-del.service</html:code> file,
as this file may be restored during future system updates.</description>
              <warning xml:lang="en-US" category="functionality">Disabling the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/init/control-alt-delete.conf</html:code> DOES NOT disable the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code>
key sequence if running in <html:code xmlns:html="http://www.w3.org/1999/xhtml">runlevel 6</html:code> (e.g. in GNOME, KDE, etc.)! The
<html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence will only be disabled if running in
the non-graphical <html:code xmlns:html="http://www.w3.org/1999/xhtml">runlevel 3</html:code>.</warning>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010610</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91867r3_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.5</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="disable_ctrlaltdel_reboot" system="urn:xccdf:fix:script:sh">systemctl mask ctrl-alt-del.target
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-disable_ctrlaltdel_reboot:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_screen_locking">
              <title xml:lang="en-US">Configure Screen Locking</title>
              <description xml:lang="en-US">When a user must temporarily leave an account
logged-in, screen locking should be employed to prevent passersby
from abusing the account. User education and training is
particularly important for screen locking to be effective, and policies
can be implemented to reinforce this.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Automatic screen locking is only meant as a safeguard for
those cases where a user forgot to lock the screen.</description>
              <Group id="xccdf_org.ssgproject.content_group_console_screen_locking">
                <title xml:lang="en-US">Configure Console Screen Locking</title>
                <description xml:lang="en-US">A console screen locking mechanism is a temporary action taken when a user
stops work and moves away from the immediate physical vicinity of the
information system but does not logout because of the temporary nature of
the absence. Rather than relying on the user to manually lock their
operation system session prior to vacating the vicinity, operating systems
need to be able to identify when a user's session has idled and take action
to initiate the session lock.</description>
                <Rule id="xccdf_org.ssgproject.content_rule_vlock_installed" selected="false" severity="medium">
                  <version>SLES-12-010070</version>
                  <title xml:lang="en-US">Check for vlock Command</title>
                  <description xml:lang="en-US">The SUSE operating system must have vlock installed to allow for session locking.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">vlock</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install vlock</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010070</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91755r2_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000056</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000058</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000060</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(1)</reference>
                  <rationale xml:lang="en-US">A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary nature of the absence.

The session lock is implemented at the point where session activity can be determined.

Regardless of where the session lock is determined and implemented, once invoked, the session lock must remain in place until the user reauthenticates. No other activity aside from reauthentication must unlock the system.</rationale>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-vlock_installed:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-vlock_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_smart_card_login">
                <title xml:lang="en-US">Hardware Tokens for Authentication</title>
                <description xml:lang="en-US">The use of hardware tokens such as smart cards for system login
provides stronger, two-factor authentication than using a username and password.

In Red Hat Enterprise Linux servers and workstations, hardware token login

is not enabled by default and must be enabled in the system settings.</description>
                <Value id="xccdf_org.ssgproject.content_value_var_smartcard_drivers" type="string" interactive="true">
                  <title xml:lang="en-US">OpenSC Smart Card Drivers</title>
                  <description xml:lang="en-US">Choose the Smart Card Driver in use by your organization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>For DoD, choose the <html:code xmlns:html="http://www.w3.org/1999/xhtml">cac</html:code> driver.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>If your driver is not listed and you don't want to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">default</html:code> driver, use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">other</html:code> option and
manually specify your driver.</description>
                  <value>default</value>
                  <value selector="acos5">acos5</value>
                  <value selector="akis">akis</value>
                  <value selector="asepcos">asepcos</value>
                  <value selector="atrust-acos">atrust-acos</value>
                  <value selector="authentic">authentic</value>
                  <value selector="belpic">belpic</value>
                  <value selector="cac">cac</value>
                  <value selector="cardos">cardos</value>
                  <value selector="coolkey">coolkey</value>
                  <value selector="cyberflex">cyberflex</value>
                  <value selector="dnie">dnie</value>
                  <value selector="entersafe">entersafe</value>
                  <value selector="epass2003">epass2003</value>
                  <value selector="flex">flex</value>
                  <value selector="gemsafeV1">gemsafeV1</value>
                  <value selector="gids">gids</value>
                  <value selector="gpk">gpk</value>
                  <value selector="iasecc">iasecc</value>
                  <value selector="incrypto34">incrypto34</value>
                  <value selector="isoApplet">isoApplet</value>
                  <value selector="itacns">itacns</value>
                  <value selector="jpki">jpki</value>
                  <value selector="MaskTech">MaskTech</value>
                  <value selector="mcrd">mcrd</value>
                  <value selector="muscle">muscle</value>
                  <value selector="myeid">myeid</value>
                  <value selector="npa">npa</value>
                  <value selector="oberthur">oberthur</value>
                  <value selector="openpgp">openpgp</value>
                  <value selector="other">None</value>
                  <value selector="PIV-II">PIV-II</value>
                  <value selector="rutoken_ecp">rutoken_ecp</value>
                  <value selector="rutoken">rutoken</value>
                  <value selector="sc-hsm">sc-hsm</value>
                  <value selector="setcos">setcos</value>
                  <value selector="starcos">starcos</value>
                  <value selector="tcos">tcos</value>
                  <value selector="westcos">westcos</value>
                </Value>
                <Rule id="xccdf_org.ssgproject.content_rule_install_smartcard_packages" selected="false" severity="medium">
                  <version>SLES-12-030500</version>
                  <title xml:lang="en-US">Install Smart Card Packages For Multifactor Authentication</title>
                  <description xml:lang="en-US">Configure the operating system to implement multifactor authentication by
installing the required packages with the following command:

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pkcs11 mozilla-nss mozilla-nss-tools pcsc-ccid pcsc-lite pcsc-tools opensc coolkey</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install pam_pkcs11 mozilla-nss mozilla-nss-tools pcsc-ccid pcsc-lite pcsc-tools opensc coolkey</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001948</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001953</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001954</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(11)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(12)</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030500</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92203r3_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001954</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000375-GPOS-00160</reference>
                  <rationale xml:lang="en-US">Using an authentication device, such as a CAC or token that is separate from
the information system, ensures that even if the information system is
compromised, that compromise will not affect credentials stored on the
authentication device.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Multifactor solutions that require devices separate from
information systems gaining access include, for example, hardware tokens
providing time-based or challenge-response authenticators and smart cards such
as the U.S. Government Personal Identity Verification card and the DoD Common
Access Card.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-install_smartcard_packages:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-install_smartcard_packages_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="false" severity="medium">
                  <title xml:lang="en-US">Enable Smart Card Login</title>
                  <description xml:lang="en-US">To enable smart card authentication, consult the documentation at:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:b><html:a href="https://www.suse.com/c/configuring-smart-card-authentication-suse-linux-enterprise/">https://www.suse.com/c/configuring-smart-card-authentication-suse-linux-enterprise/</html:a></html:b></html:li></html:ul></description>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000765</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000766</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000767</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000768</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000771</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000772</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000884</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.3</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000104-GPOS-00051</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000106-GPOS-00053</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000107-GPOS-00054</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000109-GPOS-00056</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000108-GPOS-00055</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000108-GPOS-00057</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000108-GPOS-00058</reference>
                  <rationale xml:lang="en-US">Smart card login provides two-factor authentication stronger than
that provided by a username and password combination. Smart cards leverage PKI
(public key infrastructure) in order to provide and verify credentials.</rationale>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-smartcard_auth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_smartcard_configure_cert_checking" selected="false" severity="medium">
                  <version>SLES-12-030510</version>
                  <title xml:lang="en-US">Configure Smart Card Certificate Status Checking</title>
                  <description xml:lang="en-US">Configure the operating system to do certificate status checking for PKI
authentication. Modify all of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">cert_policy</html:code> lines in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam_pkcs11/pam_pkcs11.conf</html:code> to include <html:code xmlns:html="http://www.w3.org/1999/xhtml">ocsp_on</html:code> like so:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">cert_policy = ca, ocsp_on, signature;</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001948</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001953</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001954</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(11)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(12)</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030510</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92205r2_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001954</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000375-GPOS-00160</reference>
                  <rationale xml:lang="en-US">Using an authentication device, such as a CAC or token that is separate from
the information system, ensures that even if the information system is
compromised, that compromise will not affect credentials stored on the
authentication device.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Multifactor solutions that require devices separate from
information systems gaining access include, for example, hardware tokens
providing time-based or challenge-response authenticators and smart cards such
as the U.S. Government Personal Identity Verification card and the DoD Common
Access Card.</rationale>
                  <fix id="smartcard_configure_cert_checking" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install pam_pkcs11

# Enable pcscd.socket systemd activation socket
<sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy"/>
service_command enable pcscd.socket

# Perform /etc/pam_pkcs11/pam_pkcs11.conf settings below
# Define selected constants for later reuse
SP="[:space:]"
PAM_PKCS11_CONF="/etc/pam_pkcs11/pam_pkcs11.conf"

# Ensure OCSP is turned on in $PAM_PKCS11_CONF
# 1) First replace any occurrence of 'none' value of 'cert_policy' key setting with the correct configuration
sed -i "s/^[$SP]*cert_policy[$SP]\+=[$SP]\+none;/\t\tcert_policy = ca, ocsp_on, signature;/g" "$PAM_PKCS11_CONF"
# 2) Then append 'ocsp_on' value setting to each 'cert_policy' key in $PAM_PKCS11_CONF configuration line,
# which does not contain it yet
sed -i "/ocsp_on/! s/^[$SP]*cert_policy[$SP]\+=[$SP]\+\(.*\);/\t\tcert_policy = \1, ocsp_on;/" "$PAM_PKCS11_CONF"

true
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-smartcard_configure_cert_checking:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-smartcard_configure_cert_checking_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_smartcard_pam_enabled" selected="false" severity="medium">
                  <version>SLES-12-030520</version>
                  <title xml:lang="en-US">Enable Smart Card Logins in PAM</title>
                  <description xml:lang="en-US">This requirement only applies to components where this is specific to the
function of the device or has the concept of an organizational user (e.g.,
VPN, proxy capability). This does not apply to authentication for the
purpose of configuring the device itself (management).

Check that the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pkcs11.so</html:code> option is configured in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">etc/pam.d/common-auth</html:code> file with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep pam_pkcs11.so /etc/pam.d/common-auth

auth sufficient pam_pkcs11.so</html:pre>

For general information about enabling smart card authentication, consult
the documentation at:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:b><html:a href="https://www.suse.com/c/configuring-smart-card-authentication-suse-linux-enterprise/">https://www.suse.com/c/configuring-smart-card-authentication-suse-linux-enterprise/</html:a></html:b></html:li></html:ul></description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030520</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92207r3_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000187</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000765</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000766</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000767</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000768</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001948</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001953</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001954</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(2)(c)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(2)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(3)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(4)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(11)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(12)</reference>
                  <rationale xml:lang="en-US">Smart card login provides two-factor authentication stronger than
that provided by a username and password combination. Smart cards leverage PKI
(public key infrastructure) in order to provide and verify credentials.

Using an authentication device, such as a CAC or token that is separate
from the information system, ensures that even if the information system is
compromised, that compromise will not affect credentials stored on the
authentication device.

Multifactor solutions that require devices separate from information
systems gaining access include, for example, hardware tokens providing
time-based or challenge-response authenticators and smart cards such as the
U.S. Government Personal Identity Verification card and the DoD Common
Access Card.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <fix id="smartcard_pam_enabled" system="urn:xccdf:fix:script:sh">
fname=$(mktemp -p /etc/pam.d common-auth-XXXXXXXX)
chown --reference=/etc/pam.d/common-auth "$fname"
chmod --reference=/etc/pam.d/common-auth "$fname"

IFS='
'


# we want to add the pam_pkcs11 module at the beginning of the file, after the first comment
comments_over=0
while read line ; do
    if ! [[ "$line" == \#* ]] &amp;&amp; [[ "$comments_over" -eq 0 ]] ; then
        echo 'auth sufficient pam_pkcs11.so'
        comments_over=1
    fi
    printf "%s\n" "$line"
done &lt; /etc/pam.d/common-auth &gt; "$fname"

[[ "$comments_over" -eq 0 ]] &amp;&amp; echo 'auth sufficient pam_pkcs11.so' &gt;&gt; "$fname"

mv "$fname" /etc/pam.d/common-auth
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-smartcard_pam_enabled:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-smartcard_pam_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_smartcard_configure_ca" selected="false" severity="medium">
                  <version>SLES-12-030530</version>
                  <title xml:lang="en-US">Configure Smart Card Certificate Authority Validation</title>
                  <description xml:lang="en-US">Configure the operating system to do certificate status checking for PKI
authentication. Modify all of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">cert_policy</html:code> lines in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam_pkcs11/pam_pkcs11.conf</html:code> to include <html:code xmlns:html="http://www.w3.org/1999/xhtml">ca</html:code> like so:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">cert_policy = ca, ocsp_on, signature;</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030530</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92209r1_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000185</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001991</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(2)(a)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(2)(d)</reference>
                  <rationale xml:lang="en-US">Using an authentication device, such as a CAC or token that is separate from
the information system, ensures that even if the information system is
compromised, that compromise will not affect credentials stored on the
authentication device.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Multifactor solutions that require devices separate from
information systems gaining access include, for example, hardware tokens
providing time-based or challenge-response authenticators and smart cards such
as the U.S. Government Personal Identity Verification card and the DoD Common
Access Card.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <fix id="smartcard_configure_ca" system="urn:xccdf:fix:script:sh">

# Perform /etc/pam_pkcs11/pam_pkcs11.conf settings below
# Define selected constants for later reuse
SP="[:space:]"
PAM_PKCS11_CONF="/etc/pam_pkcs11/pam_pkcs11.conf"
<sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install pam_pkcs11

# Ensure OCSP is turned on in $PAM_PKCS11_CONF
# 1) First replace any occurrence of 'none' value of 'cert_policy' key setting with the correct configuration
sed -i "s/^[$SP]*cert_policy[$SP]\+=[$SP]\+none;/\t\tcert_policy = ca, ocsp_on, signature;/g" "$PAM_PKCS11_CONF"
# 2) Then append 'ca' value setting to each 'cert_policy' key in $PAM_PKCS11_CONF configuration line,
# which does not contain it yet
sed -i "/ca/! s/^[$SP]*cert_policy[$SP]\+=[$SP]\+\(.*\);/\t\tcert_policy = \1, ca;/" "$PAM_PKCS11_CONF"

true
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-smartcard_configure_ca:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-smartcard_configure_ca_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
              </Group>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_accounts-restrictions">
            <title xml:lang="en-US">Protect Accounts by Restricting Password-Based Login</title>
            <description xml:lang="en-US">Conventionally, Unix shell accounts are accessed by
providing a username and password to a login program, which tests
these values for correctness using the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> files. Password-based login is vulnerable to
guessing of weak passwords, and to sniffing and man-in-the-middle
attacks against passwords entered over a network or at an insecure
console. Therefore, mechanisms for accessing accounts by entering
usernames and passwords should be restricted to those which are
operationally necessary.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_account_unique_id" selected="false" severity="medium">
              <version>SLES-12-010640, SLES-12-010650</version>
              <title xml:lang="en-US">Ensure All Accounts on the System Have Unique User IDs</title>
              <description xml:lang="en-US">Change user IDs (UIDs), or delete accounts, so each has a unique name.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010640</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91873r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010650</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91875r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000764</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-8</reference>
              <rationale xml:lang="en-US">To assure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to prevent potential misuse and compromise of the system.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-account_unique_id:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-account_unique_id_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_account_expiration">
              <title xml:lang="en-US">Set Account Expiration Parameters</title>
              <description xml:lang="en-US">Accounts can be configured to be automatically disabled
after a certain time period,
meaning that they will require administrator interaction to become usable again.
Expiration of accounts after inactivity can be set for all accounts by default
and also on a per-account basis, such as for accounts that are known to be temporary.
To configure automatic expiration of an account following
the expiration of its password (that is, after the password has expired and not been changed),
run the following command, substituting <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>NUM_DAYS</html:i></html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>USER</html:i></html:code> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chage -I <html:i>NUM_DAYS USER</html:i></html:pre>
Accounts, such as temporary accounts, can also be configured to expire on an explicitly-set date with the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">-E</html:code> option.
The file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/default/useradd</html:code> controls
default settings for all newly-created accounts created with the system's
normal command line utilities.</description>
              <warning xml:lang="en-US" category="general">This will only apply to newly created accounts</warning>
              <Value id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" type="number">
                <title xml:lang="en-US">number of days after a password expires until the account is permanently disabled</title>
                <description xml:lang="en-US">The number of days to wait after a password expires, until the account will be permanently disabled.</description>
                <value selector="0">0</value>
                <value selector="180">180</value>
                <value selector="30">30</value>
                <value selector="35">35</value>
                <value selector="40">40</value>
                <value selector="60">60</value>
                <value selector="90">90</value>
                <value>35</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="false" severity="medium">
                <version>SLES-12-010340</version>
                <title xml:lang="en-US">Set Account Expiration Following Inactivity</title>
                <description xml:lang="en-US">To specify the number of days after a password expires (which
signifies inactivity) until an account is permanently disabled, add or correct
the following lines in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/default/useradd</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">INACTIVE=<html:i><sub idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" use="legacy"/></html:i></html:pre>
A value of 35 is recommended; however, this profile expects that the value is set to
<html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" use="legacy"/></html:code>.
If a password is currently on the
verge of expiration, then 35 days remain until the account is automatically
disabled. However, if the password will not expire for another 60 days, then 95
days could elapse until the account would be automatically disabled. See the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">useradd</html:code> man page for more information.  Determining the inactivity
timeout must be done with careful consideration of the length of a "normal"
period of inactivity for users in the particular environment. Setting
the timeout too low incurs support costs and also has the potential to impact
availability of the system to legitimate users.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010340</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91823r1_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.6</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000017</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000795</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-4(e)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000118-GPOS-00060</reference>
                <reference href="">SRG-OS-000003-VMM-000030</reference>
                <reference href="">SRG-OS-000118-VMM-000590</reference>
                <rationale xml:lang="en-US">Disabling inactive accounts ensures that accounts which may not
have been responsibly removed are not available to attackers
who may have compromised their credentials.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <fix id="account_disable_post_pw_expiration" system="urn:xccdf:fix:script:sh">
var_account_disable_post_pw_expiration="<sub idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/default/useradd' '^INACTIVE' "$var_account_disable_post_pw_expiration" '' '%s=%s'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_account_disable_post_pw_expiration:var:1" value-id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration"/>
                  <check-content-ref name="oval:ssg-account_disable_post_pw_expiration:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="false" severity="medium">
                <version>SLES-12-010360</version>
                <title xml:lang="en-US">Assign Expiration Date to Temporary Accounts</title>
                <description xml:lang="en-US">Temporary accounts are established as part of normal account activation
procedures when there is a need for short-term accounts. In the event
temporary or emergency accounts are required, configure the system to
terminate them after a documented time period. For every temporary and
emergency account, run the following command to set an expiration date on
it, substituting <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>USER</html:i></html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>YYYY-MM-DD</html:i></html:code>
appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chage -E <html:i>YYYY-MM-DD USER</html:i></html:pre>
<html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>YYYY-MM-DD</html:i></html:code> indicates the documented expiration date for the
account. For U.S. Government systems, the operating system must be
configured to automatically terminate these types of accounts after a
period of 72 hours.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010360</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91825r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000016</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001682</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000002-GPOS-00153</reference>
                <reference href="">SRG-OS-000002-VMM-000020</reference>
                <reference href="">SRG-OS-000123-VMM-000620</reference>
                <rationale xml:lang="en-US">If temporary user accounts remain active when no longer needed or for
an excessive period, these accounts may be used to gain unauthorized access.
To mitigate this risk, automated termination of all temporary accounts
must be set upon account creation.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/></rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_unique_name" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure All Accounts on the System Have Unique Names</title>
                <description xml:lang="en-US">Change usernames, or delete accounts, so each has a unique name.</description>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000770</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000804</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.1</reference>
                <rationale xml:lang="en-US">Unique usernames allow for accountability on the system.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-account_unique_name:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_unique_name_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_use_centralized_automated_auth" selected="false" severity="medium">
                <title xml:lang="en-US">Use Centralized and Automated Authentication</title>
                <description xml:lang="en-US">Implement an automated system for managing user accounts that minimizes the
risk of errors, either intentional or deliberate. This system
should integrate with an existing enterprise user management system, such as
one based on Identity Management tools such as Active Directory, Kerberos,
Directory Server, etc.</description>
                <rationale xml:lang="en-US">A comprehensive account management process that includes automation helps to
ensure the accounts designated as requiring attention are consistently and
promptly addressed. Enterprise environments make user account management
challenging and complex. A user management process requiring administrators to
manually address account management functions adds risk of potential
oversight.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_use_centralized_automated_auth_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_minimum_age_shadow" selected="false" severity="medium">
                <version>SLES-12-010270</version>
                <title xml:lang="en-US">Set Account Password Minimum Lifetime</title>
                <description xml:lang="en-US">Configure all user accounts to enforce 24 hours/1 day or greater as the
minimum password age.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Check the minimum time period between password changes for each user account with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo cat /etc/shadow | cut -d ':' -f1,4 | grep -v 1 | grep -v ":$"

smithj:1</html:pre>

Change the minimum time period between password changes for each
user account to "<html:code xmlns:html="http://www.w3.org/1999/xhtml">1</html:code>" day with this command, replacing
<html:code xmlns:html="http://www.w3.org/1999/xhtml">[USER]</html:code> with the user account that must be changed:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo passwd -n 1 [USER]</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010270</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91809r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000198</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1).1(v)</reference>
                <rationale xml:lang="en-US">Enforcing a minimum password lifetime helps prevent repeated password
changes to defeat the password reuse or history enforcement requirement. If
users are allowed to immediately and continually change their password, the
password could be repeatedly changed in a short period of time to defeat
the organization's policy regarding password reuse.</rationale>
                <fix id="account_minimum_age_shadow" system="urn:xccdf:fix:script:sh">
for user in $( awk -F':' '$4==0 { print $1 }' &lt; /etc/shadow ) ; do
    passwd -n 1 "$user"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-account_minimum_age_shadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_minimum_age_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_maximum_age_shadow" selected="false" severity="medium">
                <version>SLES-12-010290</version>
                <title xml:lang="en-US">Set Account Password Maximum Lifetime</title>
                <description xml:lang="en-US">Configure all user accounts to enforce 24 hours/1 day or greater as the
maximum password age.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Check the maximum time period between password changes for each user account with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"># sudo awk -F':' '$5 &gt; <sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/> { print $1, $5 }' &lt; /etc/shadow

smithj 90</html:pre>

Change the maximum time period between password changes for each
user account to <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/></html:code> day with this command, replacing
<html:code xmlns:html="http://www.w3.org/1999/xhtml">[USER]</html:code> with the user account that must be changed:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"># sudo passwd -x <sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/> [USER]</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010290</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91813r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000199</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1).1(v)</reference>
                <rationale xml:lang="en-US">Enforcing a maximum password lifetime helps prevent repeated password
changes to defeat the password reuse or history enforcement requirement. If
users are allowed to immediately and continually change their password, the
password could be repeatedly changed in a short period of time to defeat
the organization's policy regarding password reuse.</rationale>
                <fix id="account_maximum_age_shadow" system="urn:xccdf:fix:script:sh">
var_accounts_maximum_age_login_defs="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/>"

for user in $( awk -F':' '$5 &gt; '"$var_accounts_maximum_age_login_defs"' { print $1 }' &lt; /etc/shadow ) ; do
    passwd -x "$var_accounts_maximum_age_login_defs" "$user"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_maximum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs"/>
                  <check-content-ref name="oval:ssg-account_maximum_age_shadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_maximum_age_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_account_emergency_admin" selected="false" severity="medium">
                <version>SLES-12-010330</version>
                <title xml:lang="en-US">Never Automatically Remove or Disable Emergency Administrator Accounts</title>
                <description xml:lang="en-US">Emergency accounts are privileged accounts that are established in response
to crisis situations where the need for rapid account activation is
required. Therefore, emergency account activation may bypass normal account
authorization processes. If these accounts are automatically disabled,
system maintenance during emergencies may not be possible, thus adversely
affecting system availability. 

Check to see if an emergency administrator account password or account expires with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo chage -l [Emergency_Administrator]

Password expires:never</html:pre>

If <html:code xmlns:html="http://www.w3.org/1999/xhtml">Password expires</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">Account expires</html:code> is set to anything other than <html:code xmlns:html="http://www.w3.org/1999/xhtml">never</html:code>, this is a finding.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010330</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91821r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001682</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</reference>
                <rationale xml:lang="en-US">Emergency accounts are different from infrequently used accounts (i.e.,
local logon accounts used by the organization's system administrators when
network or normal logon/access is not available). Infrequently used
accounts are not subject to automatic termination dates. Emergency accounts
are accounts created in response to crisis situations, usually for use by
maintenance personnel. The automatic expiration or disabling time period
may be extended as needed until the crisis is resolved; however, it must
not be extended indefinitely. A permanent account should be established for
privileged users who need long-term maintenance accounts.

To address access requirements the SUSE operating system can be integrated
with enterprise-level authentication/access mechanisms that meet or exceed
access control policy requirements.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-account_emergency_admin_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_policy_temp_passwords_immediate_change" selected="false" severity="medium">
                <version>SLES-12-010660</version>
                <title xml:lang="en-US">Policy Requires Immediate Change of Temporary Passwords</title>
                <description xml:lang="en-US">Temporary passwords for SUSE operating system logons must require an
immediate change to a permanent password.

Verify that a policy exists that ensures when a user is created, it is
creating using a method that forces a user to change their password upon
their next login.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010660</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91877r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002041</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(f)</reference>
                <rationale xml:lang="en-US">Without providing this capability, an account may be created without a
password. Nonrepudiation cannot be guaranteed once an account is created if
a user is not forced to change the temporary password upon initial logon.

Temporary passwords are typically used to allow access when new accounts
are created or passwords are changed. It is common practice for
administrators to create temporary passwords for user accounts that allow
the users to log on, yet force them to change the password once they have
successfully authenticated.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-policy_temp_passwords_immediate_change_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_password_expiration">
              <title xml:lang="en-US">Set Password Expiration Parameters</title>
              <description xml:lang="en-US">The file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> controls several
password-related settings. Programs such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">passwd</html:code>,
<html:code xmlns:html="http://www.w3.org/1999/xhtml">su</html:code>, and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">login</html:code> consult <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> to determine
behavior with regard to password aging, expiration warnings,
and length. See the man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">login.defs(5)</html:code> for more information.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Users should be forced to change their passwords, in order to
decrease the utility of compromised passwords. However, the need to
change passwords often should be balanced against the risk that
users will reuse or write down passwords if forced to change them
too often. Forcing password changes every 90-360 days, depending on
the environment, is recommended. Set the appropriate value as
<html:code xmlns:html="http://www.w3.org/1999/xhtml">PASS_MAX_DAYS</html:code> and apply it to existing accounts with the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">-M</html:code> flag.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">PASS_MIN_DAYS</html:code> (<html:code xmlns:html="http://www.w3.org/1999/xhtml">-m</html:code>) setting prevents password
changes for 7 days after the first change, to discourage password
cycling. If you use this setting, train users to contact an administrator
for an emergency password change in case a new password becomes
compromised. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">PASS_WARN_AGE</html:code> (<html:code xmlns:html="http://www.w3.org/1999/xhtml">-W</html:code>) setting gives
users 7 days of warnings at login time that their passwords are about to expire.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For example, for each existing human user <html:i xmlns:html="http://www.w3.org/1999/xhtml">USER</html:i>, expiration parameters
could be adjusted to a 180 day maximum password age, 7 day minimum password
age, and 7 day warning period with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chage -M 180 -m 7 -W 7 USER</html:pre></description>
              <Value id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" type="number">
                <title xml:lang="en-US">maximum password age</title>
                <description xml:lang="en-US">Maximum age of password in days</description>
                <warning xml:lang="en-US" category="general">This will only apply to newly created accounts</warning>
                <value selector="120">120</value>
                <value selector="180">180</value>
                <value selector="60">60</value>
                <value selector="90">90</value>
                <value>60</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" type="number">
                <title xml:lang="en-US">minimum password age</title>
                <description xml:lang="en-US">Minimum age of password in days</description>
                <warning xml:lang="en-US" category="general">This will only apply to newly created accounts</warning>
                <value selector="0">0</value>
                <value selector="1">1</value>
                <value selector="2">2</value>
                <value selector="5">5</value>
                <value selector="7">7</value>
                <value>7</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" type="number">
                <title xml:lang="en-US">minimum password length</title>
                <description xml:lang="en-US">Minimum number of characters in password</description>
                <warning xml:lang="en-US" category="general">This will only check new passwords</warning>
                <value selector="10">10</value>
                <value selector="12">12</value>
                <value selector="14">14</value>
                <value selector="15">15</value>
                <value selector="6">6</value>
                <value selector="8">8</value>
                <value>15</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" type="number">
                <title xml:lang="en-US">warning days before password expires</title>
                <description xml:lang="en-US">The number of days' warning given before a password expires.</description>
                <warning xml:lang="en-US" category="general">This will only apply to newly created accounts</warning>
                <value selector="0">0</value>
                <value selector="14">14</value>
                <value selector="7">7</value>
                <value>7</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="false" severity="medium">
                <version>SLES-12-010280</version>
                <title xml:lang="en-US">Set Password Maximum Age</title>
                <description xml:lang="en-US">To specify password maximum age for new accounts,
edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code>
and add or correct the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">PASS_MAX_DAYS <sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/></html:pre>
A value of 180 days is sufficient for many environments.
The DoD requirement is 60.
The profile requirement is <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/></html:code>.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010280</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91811r2_rule</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1).1(v)</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.4.1.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.6</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000199</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(g)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000076-GPOS-00044</reference>
                <rationale xml:lang="en-US">Any password, no matter how complex, can eventually be cracked. Therefore, passwords
need to be changed periodically. If the operating system does not limit the lifetime
of passwords and force users to change their passwords, there is the risk that the
operating system passwords could be compromised.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Setting the password maximum age ensures users are required to
periodically change their passwords. Requiring shorter password lifetimes
increases the risk of users writing down the password in a convenient
location subject to physical compromise.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <fix id="accounts_maximum_age_login_defs" system="urn:xccdf:fix:script:sh">
var_accounts_maximum_age_login_defs="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy"/>"

grep -q ^PASS_MAX_DAYS /etc/login.defs &amp;&amp; \
  sed -i "s/PASS_MAX_DAYS.*/PASS_MAX_DAYS     $var_accounts_maximum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
    echo "PASS_MAX_DAYS      $var_accounts_maximum_age_login_defs" &gt;&gt; /etc/login.defs
fi
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_maximum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs"/>
                  <check-content-ref name="oval:ssg-accounts_maximum_age_login_defs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="false" severity="medium">
                <version>SLES-12-010260</version>
                <title xml:lang="en-US">Set Password Minimum Age</title>
                <description xml:lang="en-US">To specify password minimum age for new accounts,
edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code>
and add or correct the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">PASS_MIN_DAYS <sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy"/></html:pre>
A value of 1 day is considered sufficient for many
environments. The DoD requirement is 1.
The profile requirement is <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy"/></html:code>.</description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1).1(v)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010260</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91807r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.8</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000198</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000075-GPOS-00043</reference>
                <rationale xml:lang="en-US">Enforcing a minimum password lifetime helps to prevent repeated password
changes to defeat the password reuse or history enforcement requirement. If
users are allowed to immediately and continually change their password,
then the password could be repeatedly changed in a short period of time to
defeat the organization's policy regarding password reuse.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Setting the minimum password age protects against users cycling back to a
favorite password after satisfying the password reuse requirement.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <fix id="accounts_minimum_age_login_defs" system="urn:xccdf:fix:script:sh">
var_accounts_minimum_age_login_defs="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy"/>"

grep -q ^PASS_MIN_DAYS /etc/login.defs &amp;&amp; \
  sed -i "s/PASS_MIN_DAYS.*/PASS_MIN_DAYS     $var_accounts_minimum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
    echo "PASS_MIN_DAYS      $var_accounts_minimum_age_login_defs" &gt;&gt; /etc/login.defs
fi
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_minimum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs"/>
                  <check-content-ref name="oval:ssg-accounts_minimum_age_login_defs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="false" severity="medium">
                <title xml:lang="en-US">Set Password Minimum Length in login.defs</title>
                <description xml:lang="en-US">To specify password length requirements for new accounts, edit the file
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> and add or correct the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">PASS_MIN_LEN <sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy"/></html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The DoD requirement is <html:code xmlns:html="http://www.w3.org/1999/xhtml">15</html:code>. 
The FISMA requirement is <html:code xmlns:html="http://www.w3.org/1999/xhtml">12</html:code>.
The profile requirement is
<html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy"/></html:code>.
If a program consults <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> and also another PAM module
(such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_pwquality</html:code>) during a password change operation, then
the most restrictive must be satisfied. See PAM section for more
information about enforcing password quality requirements.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.6.2.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
                <rationale xml:lang="en-US">Requiring a minimum password length makes password
cracking attacks more difficult by ensuring a larger
search space. However, any security benefit from an onerous requirement
must be carefully weighed against usability problems, support costs, or counterproductive
behavior that may result.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_password_minlen_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs"/>
                  <check-content-ref name="oval:ssg-accounts_password_minlen_login_defs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="false" severity="medium">
                <title xml:lang="en-US">Set Password Warning Age</title>
                <description xml:lang="en-US">To specify how many days prior to password
expiration that a warning will be issued to users,
edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> and add or correct
 the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">PASS_WARN_AGE <sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy"/></html:pre>
The DoD requirement is 7.
The profile requirement is <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy"/></html:code>.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <rationale xml:lang="en-US">Setting the password warning age enables users to
make the change at a practical time.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs"/>
                  <check-content-ref name="oval:ssg-accounts_password_warn_age_login_defs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_password_storage">
              <title xml:lang="en-US">Verify Proper Storage and Existence of Password
Hashes</title>
              <description xml:lang="en-US">By default, password hashes for local accounts are stored
in the second field (colon-separated) in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code>. This file should be readable only by
processes running with root credentials, preventing users from
casually accessing others' password hashes and attempting
to crack them.
However, it remains possible to misconfigure the system
and store password hashes
in world-readable files such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>, or
to even store passwords themselves in plaintext on the system.
Using system-provided tools for password change/creation
should allow administrators to avoid such misconfiguration.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="false" severity="medium">
                <title xml:lang="en-US">Verify All Account Password Hashes are Shadowed</title>
                <description xml:lang="en-US">If any password hashes are stored in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code> (in the second field,
instead of an <html:code xmlns:html="http://www.w3.org/1999/xhtml">x</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">*</html:code>), the cause of this misconfiguration should be
investigated. The account should have its password reset and the hash should be
properly stored, or the account should be deleted entirely.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.5.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.1</reference>
                <rationale xml:lang="en-US">The hashes for all user account passwords should be stored in
the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> and never in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>,
which is readable by all users.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-accounts_password_all_shadowed:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="false" severity="low">
                <title xml:lang="en-US">All GIDs referenced in /etc/passwd must be defined in /etc/group</title>
                <description xml:lang="en-US">Add a group to the system for each GID referenced without a corresponding group.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000764</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.5.a</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000104-GPOS-00051</reference>
                <rationale xml:lang="en-US">If a user is assigned the Group Identifier (GID) of a group not existing on the system, and a group
with the Gruop Identifier (GID) is subsequently created, the user may have unintended rights to
any files associated with the group.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="false" severity="high">
                <version>SLES-12-010231</version>
                <title xml:lang="en-US">Prevent Login to Accounts With Empty Password</title>
                <description xml:lang="en-US">If an account is configured for password authentication
but does not have an assigned password, it may be possible to log
into the account without authentication. Remove any instances of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nullok</html:code>

option in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-password</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/pam.d/common-auth</html:code> to

prevent logins with empty passwords.</description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000196</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010231</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-96499r1_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.2.3</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.</rationale>
                <fix id="no_empty_passwords" system="urn:xccdf:fix:script:sh">sed --follow-symlinks -i 's/\&lt;nullok\&gt;//g' /etc/pam.d/system-auth
sed --follow-symlinks -i 's/\&lt;nullok\&gt;//g' /etc/pam.d/password-auth
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-no_empty_passwords:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-no_empty_passwords_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="false" severity="medium">
                <title xml:lang="en-US">Verify No netrc Files Exist</title>
                <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">.netrc</html:code> files contain login information
used to auto-login into FTP servers and reside in the user's home
directory. These files may contain unencrypted passwords to
remote FTP servers making them susceptible to access by unauthorized
users and should not be used.  Any <html:code xmlns:html="http://www.w3.org/1999/xhtml">.netrc</html:code> files should be removed.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000196</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">Unencrypted passwords for remote FTP servers may be stored in <html:code xmlns:html="http://www.w3.org/1999/xhtml">.netrc</html:code>
files. DoD policy requires passwords be encrypted in storage and not used
in access scripts.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-no_netrc_files:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-no_netrc_files_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed_sha512" selected="false" severity="medium">
                <version>SLES-12-010220</version>
                <title xml:lang="en-US">Verify All Account Password Hashes are Shadowed with SHA512</title>
                <description xml:lang="en-US">Verify the SUSE operating system requires the shadow password suite configuration be set to encrypt interactive user passwords using a strong cryptographic hash.

Check that the interactive user account passwords are using a strong password hash with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo cut -d: -f2 /etc/shadow

$6$kcOnRq/5$NUEYPuyL.wghQwWssXRcLRFiiru7f5JPV6GaJhNC2aK5F3PZpE/BCCtwrxRc/AInKMNX3CdMw11m9STiql12f/</html:pre>

Password hashes <html:code xmlns:html="http://www.w3.org/1999/xhtml">!</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">*</html:code> indicate inactive accounts not available for logon and are not evaluated.

If any interactive user password hash does not begin with <html:code xmlns:html="http://www.w3.org/1999/xhtml">$6</html:code>, this is a finding.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010220</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91795r2_rule</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</reference>
                <rationale xml:lang="en-US">The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing rounds to ensure the required level of entropy.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-accounts_password_all_shadowed_sha512:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_password_all_shadowed_sha512_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_root_logins">
              <title xml:lang="en-US">Restrict Root Logins</title>
              <description xml:lang="en-US">Direct root logins should be allowed only for emergency use.
In normal situations, the administrator should access the system
via a unique unprivileged account, and then use <html:code xmlns:html="http://www.w3.org/1999/xhtml">su</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">sudo</html:code> to execute
privileged commands. Discouraging administrators from accessing the
root account directly ensures an audit trail in organizations with
multiple administrators. Locking down the channels through which
root can connect directly also reduces opportunities for
password-guessing against the root account. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">login</html:code> program
uses the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/securetty</html:code> to determine which interfaces
should allow root logins.

The virtual devices <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/console</html:code>
and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/tty*</html:code> represent the system consoles (accessible via
the Ctrl-Alt-F1 through Ctrl-Alt-F6 keyboard sequences on a default
installation). The default securetty file also contains <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/vc/*</html:code>.
These are likely to be deprecated in most environments, but may be retained
for compatibility. Root should also be prohibited from connecting
via network protocols. Other sections of this document
include guidance describing how to prevent root from logging in via SSH.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="false" severity="high">
                <title xml:lang="en-US">Verify Only Root Has UID 0</title>
                <description xml:lang="en-US">If any account other than root has a UID of 0, this misconfiguration should
be investigated and the accounts other than root should be removed or have
their UID changed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the account is associated with system commands or applications the UID
should be changed to one greater than "0" but less than "1000."
Otherwise assign a UID greater than "1000" that has not already been
assigned.</description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.2.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">An account has root authority if it has a UID of 0. Multiple accounts
with a UID of 0 afford more opportunity for potential intruders to
guess a password for a privileged account. Proper configuration of
sudo is recommended to afford multiple system administrators
access to root privileges in an accountable manner.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-accounts_no_uid_except_zero:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="false" severity="medium">
                <title xml:lang="en-US">Direct root Logins Not Allowed</title>
                <description xml:lang="en-US">To further limit access to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code> account, administrators
can disable root logins at the console by editing the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/securetty</html:code> file.
This file lists all devices the root user is allowed to login to. If the file does
not exist at all, the root user can login through any communication device on the
system, whether via the console or via a raw network interface. This is dangerous
as user can login to the system as root via Telnet, which sends the password in
plain text over the network. By default, SUSE Linux Enterprise 12's
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/securetty</html:code> file only allows the root user to login at the console
physically attached to the system. To prevent root from logging in, remove the
contents of this file. To prevent direct root logins, remove the contents of this
file by typing the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo echo &gt; /etc/securetty
</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.6</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <rationale xml:lang="en-US">Disabling direct root logins ensures proper accountability and multifactor
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.</rationale>
                <fix id="no_direct_root_logins" system="urn:xccdf:fix:script:sh">echo &gt; /etc/securetty
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-no_direct_root_logins:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_no_password_auth_for_systemaccounts" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure that System Accounts Are Locked</title>
                <description xml:lang="en-US">Some accounts are not associated with a human user of the system, and exist to
perform some administrative function. An attacker should not be able to log into
these accounts.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
System accounts are those user accounts with a user ID
less than UID_MIN, where value of the UID_MIN directive is set in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> configuration file. In the default configuration UID_MIN is set
to 500, thus system accounts are those user accounts with a user ID less than
500. If any system account <html:i xmlns:html="http://www.w3.org/1999/xhtml">SYSACCT</html:i> (other than root) has an unlocked password,
disable it with the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo passwd -l <html:i>SYSACCT</html:i></html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <rationale xml:lang="en-US">Disabling authentication for default system accounts makes it more difficult
for attackers to make use of them to compromise a system.false</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-no_password_auth_for_systemaccounts_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="false" severity="medium">
                <title xml:lang="en-US">Restrict Serial Port Root Logins</title>
                <description xml:lang="en-US">To restrict root logins on serial ports,
ensure lines of this form do not appear in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/securetty</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">ttyS0
ttyS1</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000770</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">Preventing direct root login to serial port interfaces
helps ensure accountability for actions taken on the systems
using the root account.</rationale>
                <fix id="restrict_serial_port_logins" system="urn:xccdf:fix:script:sh">sed -i '/ttyS/d' /etc/securetty
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-restrict_serial_port_logins:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="false" severity="medium">
                <title xml:lang="en-US">Restrict Virtual Console Root Logins</title>
                <description xml:lang="en-US">To restrict root logins through the (deprecated) virtual console devices,
ensure lines of this form do not appear in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/securetty</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">vc/1
vc/2
vc/3
vc/4</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.5</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000770</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">Preventing direct root login to virtual console devices
helps ensure accountability for actions taken on the system
using the root account.</rationale>
                <fix id="securetty_root_login_console_only" system="urn:xccdf:fix:script:sh">sed -i '/^vc\//d' /etc/securetty
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-securetty_root_login_console_only:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_accounts-session">
            <title xml:lang="en-US">Secure Session Configuration Files for Login Accounts</title>
            <description xml:lang="en-US">When a user logs into a Unix account, the system
configures the user's session by reading a number of files. Many of
these files are located in the user's home directory, and may have
weak permissions as a result of user error or misconfiguration. If
an attacker can modify or even read certain types of account
configuration information, they can often gain full access to the
affected user's account. Therefore, it is important to test and
correct configuration file permissions for interactive accounts,
particularly those of privileged users such as root or system
administrators.</description>
            <Value id="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" type="number">
              <title xml:lang="en-US">Maximum login attempts delay</title>
              <description xml:lang="en-US">Maximum time in seconds between fail login attempts before re-prompting.</description>
              <value selector="1">1</value>
              <value selector="2">2</value>
              <value selector="3">3</value>
              <value selector="4">4</value>
              <value selector="5">5</value>
              <value>4</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" type="number">
              <title xml:lang="en-US">Maximum concurrent login sessions</title>
              <description xml:lang="en-US">Maximum number of concurrent sessions by a user</description>
              <value selector="1">1</value>
              <value selector="10">10</value>
              <value selector="15">15</value>
              <value selector="20">20</value>
              <value selector="3">3</value>
              <value selector="5">5</value>
              <value>1</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_accounts_tmout" type="number">
              <title xml:lang="en-US">Account Inactivity Timeout (minutes)</title>
              <description xml:lang="en-US">In an interactive shell, the value is interpreted as the
number of seconds to wait for input after issueing the primary prompt.
Bash terminates after waiting for that number of seconds if input does
not arrive.</description>
              <value selector="30_min">1800</value>
              <value selector="10_min">600</value>
              <value selector="15_min">900</value>
              <value selector="5_min">300</value>
              <value>600</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_have_homedir_login_defs" selected="false" severity="medium">
              <version>SLES-12-010720</version>
              <title xml:lang="en-US">Ensure Home Directories are Created for New Users</title>
              <description xml:lang="en-US">All local interactive user accounts, upon creation, should be assigned a home directory.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Configure the operating system to assign home directories to all new local interactive users by setting the <html:code xmlns:html="http://www.w3.org/1999/xhtml">CREATE_HOME</html:code>
parameter in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">yes</html:code> as follows:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">CREATE_HOME yes</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010720</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91895r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If local interactive users are not assigned a valid home directory, there is no place
for the storage and control of files they should own.</rationale>
              <fix id="accounts_have_homedir_login_defs" system="urn:xccdf:fix:script:sh">
if ! grep -q ^CREATE_HOME /etc/login.defs; then
	echo "CREATE_HOME     yes" &gt;&gt; /etc/login.defs
else
	sed -i "s/^\(CREATE_HOME\).*/\1 yes/g" /etc/login.defs
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-accounts_have_homedir_login_defs:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_have_homedir_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_logon_fail_delay" selected="false" severity="low">
              <version>SLES-12-010140</version>
              <title xml:lang="en-US">Ensure the Logon Failure Delay is Set Correctly in login.defs</title>
              <description xml:lang="en-US">To ensure the logon failure delay controlled by <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> is set properly,
add or correct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">FAIL_DELAY</html:code> setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> to read as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">FAIL_DELAY <sub idref="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" use="legacy"/></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010140</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91769r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00226</reference>
              <rationale xml:lang="en-US">Increasing the time between a failed authentication attempt and re-prompting to
enter credentials helps to slow a single-threaded brute force attack.</rationale>
              <platform idref="cpe:/a:shadow-utils"/>
              <fix id="accounts_logon_fail_delay" system="urn:xccdf:fix:script:sh">

# Set variables
var_accounts_fail_delay="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_fail_delay" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/login.defs' '^FAIL_DELAY' "$var_accounts_fail_delay" '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_accounts_fail_delay:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_fail_delay"/>
                <check-content-ref name="oval:ssg-accounts_logon_fail_delay:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_logon_fail_delay_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="false" severity="low">
              <version>SLES-12-010120</version>
              <title xml:lang="en-US">Limit the Number of Concurrent Login Sessions Allowed Per User</title>
              <description xml:lang="en-US">Limiting the number of allowed users and sessions per user can limit risks related to Denial of
Service attacks. This addresses concurrent sessions for a single account and does not address
concurrent sessions by a single user via multiple accounts. To set the number of concurrent
sessions per user add the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/limits.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">* hard maxlogins <sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy"/></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010120</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91765r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000054</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-10</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000027-GPOS-00008</reference>
              <reference href="">SRG-OS-000027-VMM-000080</reference>
              <rationale xml:lang="en-US">Limiting simultaneous user logins can insulate the system from denial of service
problems caused by excessive logins. Automated login processes operating improperly or
maliciously may result in an exceptional number of simultaneous login sessions.</rationale>
              <platform idref="cpe:/a:pam"/>
              <fix id="accounts_max_concurrent_login_sessions" system="urn:xccdf:fix:script:sh">
var_accounts_max_concurrent_login_sessions="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy"/>"

if grep -q '^[^#]*\&lt;maxlogins\&gt;' /etc/security/limits.d/*.conf; then
	sed -i "/^[^#]*\&lt;maxlogins\&gt;/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.d/*.conf
elif grep -q '^[^#]*\&lt;maxlogins\&gt;' /etc/security/limits.conf; then
	sed -i "/^[^#]*\&lt;maxlogins\&gt;/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.conf
else
	echo "*	hard	maxlogins	$var_accounts_max_concurrent_login_sessions" &gt;&gt; /etc/security/limits.conf
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions"/>
                <check-content-ref name="oval:ssg-accounts_max_concurrent_login_sessions:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="false" severity="medium">
              <version>SLES-12-010090</version>
              <title xml:lang="en-US">Set Interactive Session Timeout</title>
              <description xml:lang="en-US">Setting the <html:code xmlns:html="http://www.w3.org/1999/xhtml">TMOUT</html:code> option in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/profile</html:code> ensures that
all user sessions will terminate based on inactivity. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">TMOUT</html:code>

setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/profile.d/autologout.sh</html:code> should read as follows:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">TMOUT=<sub idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" use="legacy"/>

readonly TMOUT
export TMOUT

</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000057</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010090</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91759r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.11</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001133</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000361</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-12</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-10</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000163-GPOS-00072</reference>
              <reference href="">SRG-OS-000163-VMM-000700</reference>
              <reference href="">SRG-OS-000279-VMM-001010</reference>
              <rationale xml:lang="en-US">Terminating an idle session within a short time period reduces
the window of opportunity for unauthorized personnel to take control of a
management session enabled on the console or console port that has been
left unattended.</rationale>
              <fix id="accounts_tmout" system="urn:xccdf:fix:script:sh">
var_accounts_tmout="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/profile' '^TMOUT' "$var_accounts_tmout" '' '%s=%s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_accounts_tmout:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_tmout"/>
                <check-content-ref name="oval:ssg-accounts_tmout:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_tmout_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_user_dot_no_world_writable_programs" selected="false" severity="medium">
              <version>SLES-12-010780</version>
              <title xml:lang="en-US">User Initialization Files Must Not Run World-Writable Programs</title>
              <description xml:lang="en-US">Set the mode on files being executed by the user initialization files with the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod g-w,o-w <html:i>FILE</html:i></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010780</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91921r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If user start-up files execute world-writable programs, especially in
unprotected directories, they could be maliciously modified to destroy user
files or otherwise compromise the system at the user level. If the system is
compromised at the user level, it is easier to elevate privileges to eventually
compromise the system at the root and network level.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_user_dot_no_world_writable_programs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_user_home_paths_only" selected="false" severity="medium">
              <version>SLES-12-010770</version>
              <title xml:lang="en-US">Ensure that Users Path Contains Only Local Directories</title>
              <description xml:lang="en-US">Ensure that all interactive user initialization files executable search
path statements do not contain statements that will reference a working
directory other than the users home directory.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010770</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91915r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The executable search path (typically the PATH environment variable) contains a
list of directories for the shell to search to find executables. If this path
includes the current working directory (other than the users home directory),
executables in these directories may be executed instead of system commands.
This variable is formatted as a colon-separated list of directories. If there is
an empty entry, such as a leading or trailing colon or two consecutive colons,
this is interpreted as the current working directory. If deviations from the
default system search path for the local interactive user are required, they
must be documented with the Information System Security Officer (ISSO).</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_user_home_paths_only_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_user_interactive_home_directory_defined" selected="false" severity="medium">
              <version>SLES-12-010710</version>
              <title xml:lang="en-US">All Interactive Users Must Have A Home Directory Defined</title>
              <description xml:lang="en-US">Assign home directories to all interactive users that currently do not
have a home directory assigned.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010710</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91893r1_rule</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If local interactive users are not assigned a valid home directory, there is no
place for the storage and control of files they should own.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-accounts_user_interactive_home_directory_defined:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_user_interactive_home_directory_defined_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_user_interactive_home_directory_exists" selected="false" severity="medium">
              <version>SLES-12-010730</version>
              <title xml:lang="en-US">All Interactive Users Home Directories Must Exist</title>
              <description xml:lang="en-US">Create home directories to all interactive users that currently do not
have a home directory assigned. Use the following commands to create the user
home directory assigned in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo mkdir /home/<html:i>USER</html:i></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010730</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91899r1_rule</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If a local interactive user has a home directory defined that does not exist,
the user may be given access to the / directory as the current working directory
upon logon. This could create a Denial of Service because the user would not be
able to access their logon configuration files, and it may give them visibility
to system files they normally would not be able to access.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-accounts_user_interactive_home_directory_exists:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_user_interactive_home_directory_exists_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_users_home_files_groupownership" selected="false" severity="medium">
              <version>SLES-12-010750</version>
              <title xml:lang="en-US">All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary User</title>
              <description xml:lang="en-US">Change the group of a local interactive users files and directories to a
group that the interactive user is a member of. To change the group owner of a
local interactive users files and directories, use the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp <html:i>USER_GROUP</html:i> /home/<html:i>USER</html:i>/<html:i>FILE_DIR</html:i></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010750</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91907r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If a local interactive users files are group-owned by a group of which the
user is not a member, unintended users may be able to access them.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_users_home_files_groupownership_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permission_user_init_files" selected="false" severity="medium">
              <version>SLES-12-010760</version>
              <title xml:lang="en-US">Ensure All User Initialization Files Have Mode 0740 Or Less Permissive</title>
              <description xml:lang="en-US">Set the mode of the user initialization files to <html:code xmlns:html="http://www.w3.org/1999/xhtml">0740</html:code> or less permissive with the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod g-wx,o= /home/<html:i>USER</html:i>/.<html:i>INIT_FILE</html:i></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010760</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91911r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Local initialization files are used to configure the user's shell environment
upon logon. Malicious modification of these files could compromise accounts upon
logon.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permission_user_init_files:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permission_user_init_files_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_home_directories" selected="false" severity="medium">
              <version>SLES-12-010740</version>
              <title xml:lang="en-US">All Interactive User Home Directories Must Have mode 0750 Or Less Permissive</title>
              <description xml:lang="en-US">Change the mode of interactive users home directories to <html:code xmlns:html="http://www.w3.org/1999/xhtml">0750</html:code>. To
change the mode of interactive users home directory, use the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0750 /home/<html:i>USER</html:i></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010740</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91903r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Excessive permissions on local interactive user home directories may allow
unauthorized access to user files by other users.</rationale>
              <fix id="file_permissions_home_directories" system="urn:xccdf:fix:script:sh">
for dir in $(getent passwd | awk -F: '$3 &gt;= 1000 {print $6}') ; do
    perms=$(stat -c '%A' "$dir")
    if [[ "$perms" == ?????w???? ]] || [[ "$perms" == ???????r?? ]] || [[ "$perms" == ????????w? ]] || [[ "$perms" == ?????????x ]] ; then
        chmod g-w,o= "$dir"
    fi
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permissions_home_directories:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_home_directories_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="false" severity="unknown">
              <title xml:lang="en-US">Ensure that User Home Directories are not Group-Writable or World-Readable</title>
              <description xml:lang="en-US">For each human user of the system, view the
permissions of the user's home directory:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># ls -ld /home/<html:i>USER</html:i></html:pre>
Ensure that the directory is not group-writable and that it
is not world-readable. If necessary, repair the permissions:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># chmod g-w /home/<html:i>USER</html:i>
# chmod o-rwx /home/<html:i>USER</html:i></html:pre></description>
              <warning xml:lang="en-US" category="functionality">This action may involve modifying user home directories.
Notify your user community, and solicit input if appropriate,
before making this type of change.</warning>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000225</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <rationale xml:lang="en-US">User home directories contain many configuration files which
affect the behavior of a user's account. No user should ever have
write permission to another user's home directory. Group shared
directories can be configured in sub-directories or elsewhere in the
filesystem if they are needed. Typically, user home directories
should not be world-readable, as it would disclose file names
to other users. If a subset of users need read access
to one another's home directories, this can be provided using
groups or ACLs.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permissions_home_dirs:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_root_paths">
              <title xml:lang="en-US">Ensure that No Dangerous Directories Exist in Root's Path</title>
              <description xml:lang="en-US">The active path of the root account can be obtained by
starting a new root shell and running:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># echo $PATH</html:pre>
This will produce a colon-separated list of
directories in the path.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Certain path elements could be considered dangerous, as they could lead
to root executing unknown or
untrusted programs, which could contain malicious
code.
Since root may sometimes work inside
untrusted directories, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">.</html:code> character, which represents the
current directory, should never be in the root path, nor should any
directory which can be written to by an unprivileged or
semi-privileged (system) user.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
It is a good practice for administrators to always execute
privileged commands by typing the full path to the
command.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure that Root's Path Does Not Include World or Group-Writable Directories</title>
                <description xml:lang="en-US">For each element in root's path, run:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># ls -ld <html:i>DIR</html:i></html:pre>
and ensure that write permissions are disabled for group and
other.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <rationale xml:lang="en-US">Such entries increase the risk that root could
execute code provided by unprivileged users,
and potentially malicious code.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-accounts_root_path_dirs_no_write:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_root_path_no_dot" selected="false" severity="unknown">
                <title xml:lang="en-US">Ensure that Root's Path Does Not Include Relative Paths or Null Directories</title>
                <description xml:lang="en-US">Ensure that none of the directories in root's path is equal to a single
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.</html:code> character, or
that it contains any instances that lead to relative path traversal, such as
<html:code xmlns:html="http://www.w3.org/1999/xhtml">..</html:code> or beginning a path without the slash (<html:code xmlns:html="http://www.w3.org/1999/xhtml">/</html:code>) character.
Also ensure that there are no "empty" elements in the path, such as in these examples:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PATH=:/bin
PATH=/bin:
PATH=/bin::/sbin</html:pre>
These empty elements have the same effect as a single <html:code xmlns:html="http://www.w3.org/1999/xhtml">.</html:code> character.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <rationale xml:lang="en-US">Including these entries increases the risk that root could
execute code from an untrusted location.</rationale>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_user_umask">
              <title xml:lang="en-US">Ensure that Users Have Sensible Umask Values</title>
              <description xml:lang="en-US">The umask setting controls the default permissions
for the creation of new files.
With a default <html:code xmlns:html="http://www.w3.org/1999/xhtml">umask</html:code> setting of 077, files and directories
created by users will not be readable by any other user on the
system. Users who wish to make specific files group- or
world-readable can accomplish this by using the chmod command.
Additionally, users can make all their files readable to their
group by default by setting a <html:code xmlns:html="http://www.w3.org/1999/xhtml">umask</html:code> of 027 in their shell
configuration files. If default per-user groups exist (that is, if
every user has a default group whose name is the same as that
user's username and whose only member is the user), then it may
even be safe for users to select a <html:code xmlns:html="http://www.w3.org/1999/xhtml">umask</html:code> of 007, making it very
easy to intentionally share files with groups of which the user is
a member.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
              <Value id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" type="string">
                <title xml:lang="en-US">Sensible umask</title>
                <description xml:lang="en-US">Enter default user umask</description>
                <value selector="007">007</value>
                <value selector="022">022</value>
                <value selector="027">027</value>
                <value selector="077">077</value>
                <value>027</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="false" severity="medium">
                <version>SLES-12-010620</version>
                <title xml:lang="en-US">Ensure the Default Umask is Set Correctly in login.defs</title>
                <description xml:lang="en-US">To ensure the default umask controlled by <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> is set properly,
add or correct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">UMASK</html:code> setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/login.defs</html:code> to read as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">UMASK <sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy"/></html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010620</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91869r1_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-2</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00228</reference>
                <rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read and
written to by unauthorized users.</rationale>
                <platform idref="cpe:/a:shadow-utils"/>
                <fix id="accounts_umask_etc_login_defs" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/login.defs' '^UMASK' "$var_accounts_user_umask" '' '%s %s'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask"/>
                  <check-content-ref name="oval:ssg-accounts_umask_etc_login_defs:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="false" severity="unknown">
                <title xml:lang="en-US">Ensure the Default Umask is Set Correctly in /etc/profile</title>
                <description xml:lang="en-US">To ensure the default umask controlled by <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/profile</html:code> is set properly,
add or correct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">umask</html:code> setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/profile</html:code> to read as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">umask <sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy"/></html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.4.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.03</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-2</reference>
                <rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_interactive_users" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure the Default Umask is Set Correctly For Interactive Users</title>
                <description xml:lang="en-US">Remove the <html:code xmlns:html="http://www.w3.org/1999/xhtml">UMASK</html:code> environment variable from all interactive users initialization files.</description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001814</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">The umask controls the default access mode assigned to newly created files. A
umask of 077 limits new files to mode 700 or less permissive. Although umask can
be represented as a four-digit number, the first digit representing special
access modes is typically ignored or required to be 0. This requirement
applies to the globally configured system defaults and the local interactive
user defaults for each account on the system.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-accounts_umask_interactive_users_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_auditing">
          <title xml:lang="en-US">System Accounting with auditd</title>
          <description xml:lang="en-US">The audit service provides substantial capabilities
for recording system activities. By default, the service audits about
SELinux AVC denials and certain types of security-relevant events
such as system logins, account modifications, and authentication
events performed by programs such as sudo.
Under its default configuration, <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> has modest disk space
requirements, and should not noticeably impact system performance.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
NOTE: The Linux Audit daemon <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> can be configured to use
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules files (<html:code xmlns:html="http://www.w3.org/1999/xhtml">*.rules</html:code>)
located in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> location and compile them to create
the resulting form of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> configuration file
during the daemon startup (default configuration). Alternatively, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon can use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility to read audit rules from the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> configuration file during daemon startup,
and load them into the kernel. The expected behavior is configured via the
appropriate <html:code xmlns:html="http://www.w3.org/1999/xhtml">ExecStartPost</html:code> directive setting in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/lib/systemd/system/auditd.service</html:code> configuration file.
To instruct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program
to read audit rules (default configuration), use the following setting:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/> <html:pre xmlns:html="http://www.w3.org/1999/xhtml">ExecStartPost=-/sbin/augenrules --load</html:pre>
in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/lib/systemd/system/auditd.service</html:code> configuration file.
In order to instruct the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules, use the following setting:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/> <html:pre xmlns:html="http://www.w3.org/1999/xhtml">ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules</html:pre>
in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/lib/systemd/system/auditd.service</html:code> configuration file.
Refer to <html:code xmlns:html="http://www.w3.org/1999/xhtml">[Service]</html:code> section of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/lib/systemd/system/auditd.service</html:code>
configuration file for further details.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Government networks often have substantial auditing
requirements and <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> can be configured to meet these
requirements.
Examining some example audit records demonstrates how the Linux audit system
satisfies common requirements.
The following example from Fedora Documentation available at
<html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/SELinux_Users_and_Administrators_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html#sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/SELinux_Users_and_Administrators_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html#sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages</html:a></html:code>
shows the substantial amount of information captured in a
two typical "raw" audit messages, followed by a breakdown of the most important
fields. In this example the message is SELinux-related and reports an AVC
denial (and the associated system call) that occurred when the Apache HTTP
Server attempted to access the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/www/html/file1</html:code> file (labeled with
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">samba_share_t</html:code> type):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">type=AVC msg=audit(1226874073.147:96): avc:  denied  { getattr } for pid=2465 comm="httpd"
path="/var/www/html/file1" dev=dm-0 ino=284133 scontext=unconfined_u:system_r:httpd_t:s0
tcontext=unconfined_u:object_r:samba_share_t:s0 tclass=file

type=SYSCALL msg=audit(1226874073.147:96): arch=40000003 syscall=196 success=no exit=-13
a0=b98df198 a1=bfec85dc a2=54dff4 a3=2008171 items=0 ppid=2463 pid=2465 auid=502 uid=48
gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) ses=6 comm="httpd"
exe="/usr/sbin/httpd" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
</html:pre>
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>msg=audit(1226874073.147:96)</html:code><html:ul><html:li>The number in parentheses is the unformatted time stamp (Epoch time)
for the event, which can be converted to standard time by using the
<html:code>date</html:code> command.
</html:li></html:ul></html:li><html:li><html:code>{ getattr }</html:code><html:ul><html:li>The item in braces indicates the permission that was denied. <html:code>getattr</html:code>
indicates the source process was trying to read the target file's status information.
This occurs before reading files. This action is denied due to the file being
accessed having the wrong label. Commonly seen permissions include <html:code>getattr</html:code>,
<html:code>read</html:code>, and <html:code>write</html:code>.</html:li></html:ul></html:li><html:li><html:code>comm="httpd"</html:code><html:ul><html:li>The executable that launched the process. The full path of the executable is
found in the <html:code>exe=</html:code> section of the system call (<html:code>SYSCALL</html:code>) message,
which in this case, is <html:code>exe="/usr/sbin/httpd"</html:code>.
</html:li></html:ul></html:li><html:li><html:code>path="/var/www/html/file1"</html:code><html:ul><html:li>The path to the object (target) the process attempted to access.
</html:li></html:ul></html:li><html:li><html:code>scontext="unconfined_u:system_r:httpd_t:s0"</html:code><html:ul><html:li>The SELinux context of the process that attempted the denied action. In
this case, it is the SELinux context of the Apache HTTP Server, which is running
in the <html:code>httpd_t</html:code> domain.
</html:li></html:ul></html:li><html:li><html:code>tcontext="unconfined_u:object_r:samba_share_t:s0"</html:code><html:ul><html:li>The SELinux context of the object (target) the process attempted to access.
In this case, it is the SELinux context of <html:code>file1</html:code>. Note: the <html:code>samba_share_t</html:code>
type is not accessible to processes running in the <html:code>httpd_t</html:code> domain.</html:li></html:ul></html:li><html:li> From the system call (<html:code>SYSCALL</html:code>) message, two items are of interest:
<html:ul><html:li><html:code>success=no</html:code>: indicates whether the denial (AVC) was enforced or not.
<html:code>success=no</html:code> indicates the system call was not successful (SELinux denied
access). <html:code>success=yes</html:code> indicates the system call was successful - this can
be seen for permissive domains or unconfined domains, such as <html:code>initrc_t</html:code>
and <html:code>kernel_t</html:code>.
</html:li><html:li><html:code>exe="/usr/sbin/httpd"</html:code>: the full path to the executable that launched
the process, which in this case, is <html:code>exe="/usr/sbin/httpd"</html:code>.
</html:li></html:ul>
</html:li></html:ul></description>
          <platform idref="cpe:/a:machine"/>
          <Rule id="xccdf_org.ssgproject.content_rule_package_auditd_installed" selected="false" severity="medium">
            <title xml:lang="en-US">install the auditd service</title>
            <description xml:lang="en-US">The auditd service should be installed.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R50)</reference>
            <rationale xml:lang="en-US">The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparision with potential local access control policy such as SELinux policy.</rationale>
            <platform idref="cpe:/a:machine"/>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="false" severity="high">
            <version>SLES-12-020010</version>
            <title xml:lang="en-US">Enable auditd Service</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service is an essential userspace component of
the Linux Auditing System, as it is responsible for writing audit records to
disk.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable auditd.service</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020010</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91985r1_rule</reference>
            <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.1.2</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.6</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000131</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000132</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000133</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000134</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iv)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(g)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-14(1)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
            <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000038-GPOS-00016</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000039-GPOS-00017</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00021</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000254-GPOS-00095</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000255-GPOS-00096</reference>
            <reference href="">SRG-OS-000037-VMM-000150</reference>
            <reference href="">SRG-OS-000063-VMM-000310</reference>
            <reference href="">SRG-OS-000038-VMM-000160</reference>
            <reference href="">SRG-OS-000039-VMM-000170</reference>
            <reference href="">SRG-OS-000040-VMM-000180</reference>
            <reference href="">SRG-OS-000041-VMM-000190</reference>
            <rationale xml:lang="en-US">Without establishing what type of events occurred, it would be difficult
to establish, correlate, and investigate the events leading up to an outage or attack.
Ensuring the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service is active ensures audit records
generated by the kernel are appropriately recorded.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_auditd_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'audit' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'auditd.service'
"$SYSTEMCTL_EXEC" enable 'auditd.service'
</fix>
            <fix id="service_auditd_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service auditd
  service:
    name: auditd
    enabled: 'yes'
    state: started
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_auditd_enabled
    - high_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-2(g)
    - NIST-800-53-AU-3
    - NIST-800-53-AC-17(1)
    - NIST-800-53-AU-1(b)
    - NIST-800-53-AU-10
    - NIST-800-53-AU-12(a)
    - NIST-800-53-AU-12(c)
    - NIST-800-53-AU-14(1)
    - NIST-800-53-IR-5
    - NIST-800-171-3.3.1
    - NIST-800-171-3.3.2
    - NIST-800-171-3.3.6
    - PCI-DSS-Req-10.1
    - CJIS-5.4.1.1
    - DISA-STIG-020010
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_auditd_enabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_audit_installed" selected="false" severity="medium">
            <version>SLES-12-020000</version>
            <title xml:lang="en-US">install the audit service</title>
            <description xml:lang="en-US">The audit service should be installed.</description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020000</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91983r3_rule</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-7(a)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-7(b)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(b)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(3)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-5(1)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12.1(iv)</reference>
            <rationale xml:lang="en-US">The audit service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparision with potential local access control policy such as SELinux policy.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_audit_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install audit
</fix>
            <fix id="package_audit_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure audit is installed
  package:
    name: audit
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_audit_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-12(c)
    - NIST-800-53-AU-7(a)
    - NIST-800-53-AU-7(b)
    - NIST-800-53-AU-8(b)
    - NIST-800-53-AU-12(3)
    - NIST-800-53-CM-5(1)
    - NIST-800-53-AU-12.1(iv)
    - DISA-STIG-020000
</fix>
            <fix id="package_audit_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_audit

class install_audit {
  package { 'audit':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_audit_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_audit-audispd-plugins_installed" selected="false" severity="medium">
            <version>SLES-12-020070</version>
            <title xml:lang="en-US">install the audit-audispd-plugins package</title>
            <description xml:lang="en-US">The audit-audispd-plugins service should be installed.</description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020070</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91997r1_rule</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
            <rationale xml:lang="en-US">The audit-audispd-plugins service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparision with potential local access control policy such as AppArmor policy.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_audit-audispd-plugins_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install audit-audispd-plugins
</fix>
            <fix id="package_audit-audispd-plugins_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure audit-audispd-plugins is installed
  package:
    name: audit-audispd-plugins
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_audit-audispd-plugins_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-4(1)
    - DISA-STIG-020070
</fix>
            <fix id="package_audit-audispd-plugins_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_audit-audispd-plugins

class install_audit-audispd-plugins {
  package { 'audit-audispd-plugins':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_audit-audispd-plugins_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_auditd_configure_rules">
            <title xml:lang="en-US">Configure auditd Rules for Comprehensive Auditing</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> program can perform comprehensive
monitoring of system activity. This section describes recommended
configuration settings for comprehensive auditing, but a full
description of the auditing system's capabilities is beyond the
scope of this guide. The mailing list <html:i xmlns:html="http://www.w3.org/1999/xhtml">linux-audit@redhat.com</html:i> exists
to facilitate community discussion of the auditing system.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The audit subsystem supports extensive collection of events, including:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>Tracing of arbitrary system calls (identified by name or number)
on entry or exit.</html:li><html:li>Filtering by PID, UID, call success, system call argument (with
some limitations), etc.</html:li><html:li>Monitoring of specific files for modifications to the file's
contents or metadata.</html:li></html:ul>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Auditing rules at startup are controlled by the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>.
Add rules to it to meet the auditing requirements for your organization.
Each line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> represents a series of arguments
that can be passed to <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> and can be individually tested
during runtime. See documentation in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/share/doc/audit-<html:i>VERSION</html:i></html:code> and
in the related man pages for more details.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If copying any example audit rulesets from <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/share/doc/audit-VERSION</html:code>,
be sure to comment out the
lines containing <html:code xmlns:html="http://www.w3.org/1999/xhtml">arch=</html:code> which are not appropriate for your system's
architecture. Then review and understand the following rules,
ensuring rules are activated as needed for the appropriate
architecture.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
After reviewing all the rules, reading the following sections, and
editing as needed, the new rules can be activated as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo service auditd restart</html:pre></description>
            <platform idref="cpe:/a:machine"/>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="false" severity="medium">
              <title xml:lang="en-US">Make the auditd Configuration Immutable</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to make the auditd configuration
immutable:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-e 2</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to make the auditd configuration
immutable:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-e 2</html:pre>
With this setting, a reboot will be required to change any audit rules.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.1.18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.3</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iv)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.2</reference>
              <rationale xml:lang="en-US">Making the audit configuration immutable prevents accidental as
well as malicious modification of the audit rules, although it may be
problematic if legitimate changes are needed during system
operation</rationale>
              <platform idref="cpe:/a:machine"/>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="false" severity="medium">
              <title xml:lang="en-US">Record Events that Modify the System's Mandatory Access Controls</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/selinux/ -p wa -k MAC-policy</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/selinux/ -p wa -k MAC-policy</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.8</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
              <rationale xml:lang="en-US">The system's mandatory access policy (SELinux) should not be
arbitrarily changed by anything other than administrator action. All changes to
MAC policy should be audited.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure auditd Collects Information on Exporting to Media (successful)</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect media exportation
events for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to
use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup
(the default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in
the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S mount -F auid&gt;=1000 -F auid!=unset -F key=export</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S mount -F auid&gt;=1000 -F auid!=unset -F key=export</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
              <rationale xml:lang="en-US">The unauthorized exportation of data to external media could result in an information leak
where classified information, Privacy Act information, and intellectual property could be lost. An audit
trail should be created each time a filesystem is mounted to help identify and guard against information
loss.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="false" severity="medium">
              <title xml:lang="en-US">Record Events that Modify the System's Network Environment</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S sethostname,setdomainname -F key=audit_rules_networkconfig_modification
-w /etc/issue -p wa -k audit_rules_networkconfig_modification
-w /etc/issue.net -p wa -k audit_rules_networkconfig_modification
-w /etc/hosts -p wa -k audit_rules_networkconfig_modification
-w /etc/sysconfig/network -p wa -k audit_rules_networkconfig_modification</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S sethostname,setdomainname -F key=audit_rules_networkconfig_modification
-w /etc/issue -p wa -k audit_rules_networkconfig_modification
-w /etc/issue.net -p wa -k audit_rules_networkconfig_modification
-w /etc/hosts -p wa -k audit_rules_networkconfig_modification
-w /etc/sysconfig/network -p wa -k audit_rules_networkconfig_modification</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
              <rationale xml:lang="en-US">The network environment should not be modified by anything other
than administrator action. Any change to network parameters should be
audited.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="false" severity="medium">
              <title xml:lang="en-US">Record Attempts to Alter Process and Session Initiation Information</title>
              <description xml:lang="en-US">The audit system already collects process information for all
users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing such process information:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/run/utmp -p wa -k session
-w /var/log/btmp -p wa -k session
-w /var/log/wtmp -p wa -k session</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for attempted manual
edits of files involved in storing such process information:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/run/utmp -p wa -k session
-w /var/log/btmp -p wa -k session
-w /var/log/wtmp -p wa -k session</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.9</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.3</reference>
              <rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</rationale>
              <platform idref="cpe:/a:machine"/>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure auditd Collects System Administrator Actions</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect administrator actions
for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the default),
add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/sudoers -p wa -k actions
-w /etc/sudoers.d/ -p wa -k actions</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/sudoers -p wa -k actions
-w /etc/sudoers.d/ -p wa -k actions</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(7)(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.2</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5.b</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000037-GPOS-00015</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000462-GPOS-00206</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
              <reference href="">SRG-OS-000462-VMM-001840</reference>
              <reference href="">SRG-OS-000471-VMM-001910</reference>
              <rationale xml:lang="en-US">The actions taken by system administrators should be audited to keep a record
of what was executed on the system, as well as, for accountability purposes.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="false" severity="medium">
              <title xml:lang="en-US">Record Events that Modify User/Group Information</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/group -p wa -k audit_rules_usergroup_modification
-w /etc/passwd -p wa -k audit_rules_usergroup_modification
-w /etc/gshadow -p wa -k audit_rules_usergroup_modification
-w /etc/shadow -p wa -k audit_rules_usergroup_modification
-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/group -p wa -k audit_rules_usergroup_modification
-w /etc/passwd -p wa -k audit_rules_usergroup_modification
-w /etc/gshadow -p wa -k audit_rules_usergroup_modification
-w /etc/shadow -p wa -k audit_rules_usergroup_modification
-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to account changes;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_usergroup_modification_group</html:code></html:li><html:li><html:code>audit_rules_usergroup_modification_gshadow</html:code></html:li><html:li><html:code>audit_rules_usergroup_modification_passwd</html:code></html:li></html:ul></warning>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000004-GPOS-00004</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000239-GPOS-00089</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000241-GPOS-00090</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000241-GPOS-00091</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000303-GPOS-00120</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000476-GPOS-00221</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/group" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/group" "wa" "audit_rules_usergroup_modification"
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_group" selected="false" severity="medium">
              <version>SLES-12-020210</version>
              <title xml:lang="en-US">Record Events that Modify User/Group Information - /etc/group</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/group -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/group -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020210</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92013r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001404</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001405</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001683</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001684</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001685</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001686</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002132</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000004-GPOS-00004</reference>
              <reference href="">SRG-OS-000004-VMM-000040</reference>
              <reference href="">SRG-OS-000239-VMM-000810</reference>
              <reference href="">SRG-OS-000240-VMM-000820</reference>
              <reference href="">SRG-OS-000241-VMM-000830</reference>
              <reference href="">SRG-OS-000274-VMM-000960</reference>
              <reference href="">SRG-OS-000275-VMM-000970</reference>
              <reference href="">SRG-OS-000276-VMM-000980</reference>
              <reference href="">SRG-OS-000277-VMM-000990</reference>
              <reference href="">SRG-OS-000303-VMM-001090</reference>
              <reference href="">SRG-OS-000304-VMM-001100</reference>
              <reference href="">SRG-OS-000476-VMM-001960</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification_group" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/group" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/group" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification_group:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_group_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_gshadow" selected="false" severity="medium">
              <version>SLES-12-020590</version>
              <title xml:lang="en-US">Record Events that Modify User/Group Information - /etc/gshadow</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/gshadow -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/gshadow -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020590</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92089r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001404</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001405</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001683</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001684</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001685</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001686</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002132</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000004-GPOS-00004</reference>
              <reference href="">SRG-OS-000004-VMM-000040</reference>
              <reference href="">SRG-OS-000239-VMM-000810</reference>
              <reference href="">SRG-OS-000240-VMM-000820</reference>
              <reference href="">SRG-OS-000241-VMM-000830</reference>
              <reference href="">SRG-OS-000274-VMM-000960</reference>
              <reference href="">SRG-OS-000275-VMM-000970</reference>
              <reference href="">SRG-OS-000276-VMM-000980</reference>
              <reference href="">SRG-OS-000277-VMM-000990</reference>
              <reference href="">SRG-OS-000303-VMM-001090</reference>
              <reference href="">SRG-OS-000304-VMM-001100</reference>
              <reference href="">SRG-OS-000476-VMM-001960</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification_gshadow" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification_gshadow:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_gshadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_opasswd" selected="false" severity="medium">
              <version>SLES-12-020230</version>
              <title xml:lang="en-US">Record Events that Modify User/Group Information - /etc/security/opasswd</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020230</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92017r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001404</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001405</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001683</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001684</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001685</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001686</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002132</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000003-GPOS-00004</reference>
              <reference href="">SRG-OS-000004-VMM-000040</reference>
              <reference href="">SRG-OS-000239-VMM-000810</reference>
              <reference href="">SRG-OS-000240-VMM-000820</reference>
              <reference href="">SRG-OS-000241-VMM-000830</reference>
              <reference href="">SRG-OS-000274-VMM-000960</reference>
              <reference href="">SRG-OS-000275-VMM-000970</reference>
              <reference href="">SRG-OS-000276-VMM-000980</reference>
              <reference href="">SRG-OS-000277-VMM-000990</reference>
              <reference href="">SRG-OS-000303-VMM-001090</reference>
              <reference href="">SRG-OS-000304-VMM-001100</reference>
              <reference href="">SRG-OS-000476-VMM-001960</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification_opasswd" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification_opasswd:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_opasswd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_passwd" selected="false" severity="medium">
              <version>SLES-12-020200</version>
              <title xml:lang="en-US">Record Events that Modify User/Group Information - /etc/passwd</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/passwd -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/passwd -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020200</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92011r1_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001404</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001405</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001683</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001684</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001685</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001686</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002132</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000004-GPOS-00004</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000239-GPOS-00089</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000240-GPOS-00090</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000241-GPOS-00091</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000303-GPOS-00120</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000476-GPOS-00221</reference>
              <reference href="">SRG-OS-000004-VMM-000040</reference>
              <reference href="">SRG-OS-000239-VMM-000810</reference>
              <reference href="">SRG-OS-000240-VMM-000820</reference>
              <reference href="">SRG-OS-000241-VMM-000830</reference>
              <reference href="">SRG-OS-000274-VMM-000960</reference>
              <reference href="">SRG-OS-000275-VMM-000970</reference>
              <reference href="">SRG-OS-000276-VMM-000980</reference>
              <reference href="">SRG-OS-000277-VMM-000990</reference>
              <reference href="">SRG-OS-000303-VMM-001090</reference>
              <reference href="">SRG-OS-000304-VMM-001100</reference>
              <reference href="">SRG-OS-000476-VMM-001960</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification_passwd" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification_passwd:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_passwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification_shadow" selected="false" severity="medium">
              <version>SLES-12-020220</version>
              <title xml:lang="en-US">Record Events that Modify User/Group Information - /etc/shadow</title>
              <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/shadow -p wa -k audit_rules_usergroup_modification</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, in order to capture events that modify
account changes:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/shadow -p wa -k audit_rules_usergroup_modification</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020220</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92015r3_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000018</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001403</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001404</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001405</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001683</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001684</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001685</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001686</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002130</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002132</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000004-GPOS-00004</reference>
              <reference href="">SRG-OS-000004-VMM-000040</reference>
              <reference href="">SRG-OS-000239-VMM-000810</reference>
              <reference href="">SRG-OS-000240-VMM-000820</reference>
              <reference href="">SRG-OS-000241-VMM-000830</reference>
              <reference href="">SRG-OS-000274-VMM-000960</reference>
              <reference href="">SRG-OS-000275-VMM-000970</reference>
              <reference href="">SRG-OS-000276-VMM-000980</reference>
              <reference href="">SRG-OS-000277-VMM-000990</reference>
              <reference href="">SRG-OS-000303-VMM-001090</reference>
              <reference href="">SRG-OS-000304-VMM-001100</reference>
              <reference href="">SRG-OS-000476-VMM-001960</reference>
              <rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any unexpected
users, groups, or modifications should be investigated for legitimacy.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_usergroup_modification_shadow" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "augenrules" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_usergroup_modification_shadow:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_usergroup_modification_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_directory_access_var_log_audit" selected="false" severity="medium">
              <title xml:lang="en-US">Record Access Events to Audit Log directory</title>
              <description xml:lang="en-US">The audit system should collect access events to read audit log directory.
The following audit rule will assure that access to audit log directory are
collected.
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F dir=/var/log/audit/ -F perm=r -F auid&gt;=1000 -F auid!=unset -F key=access-audit-trail</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code>
program to read audit rules during daemon startup (the default), add the
rule to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>.
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the rule to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file.</description>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <rationale xml:lang="en-US">Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
Auditing these events could serve as evidence of potential system compromise.'</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-directory_access_var_log_audit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_directory_permissions_var_log_audit" selected="false" severity="unknown">
              <title xml:lang="en-US">System Audit Logs Must Have Mode 0750 or Less Permissive</title>
              <description xml:lang="en-US">If <html:code xmlns:html="http://www.w3.org/1999/xhtml">log_group</html:code> in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code> is set to a group other than the <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code>
group account, change the mode of the audit log files with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0750 /var/log/audit</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Otherwise, change the mode of the audit log files with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0700 /var/log/audit</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <rationale xml:lang="en-US">If users can write to audit logs, audit trails can be modified or destroyed.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-directory_permissions_var_log_audit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="false" severity="medium">
              <title xml:lang="en-US">System Audit Logs Must Be Owned By Root</title>
              <description xml:lang="en-US">All audit logs must be owned by root user and group. By default, the path for audit log is <html:pre xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit/</html:pre>.

To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /var/log/audit </html:pre>

To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit/*</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /var/log/audit/* </html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000163</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.1</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000058-GPOS-00028</reference>
              <rationale xml:lang="en-US">Unauthorized disclosure of audit records can reveal system and configuration data to
attackers, thus compromising its confidentiality.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="file_ownership_var_log_audit" system="urn:xccdf:fix:script:sh">
if LC_ALL=C grep -m 1 -q ^log_group /etc/audit/auditd.conf; then
  GROUP=$(awk -F "=" '/log_group/ {print $2}' /etc/audit/auditd.conf | tr -d ' ')
  if ! [ "${GROUP}" == 'root' ] ; then
    chown root.${GROUP} /var/log/audit
    chown root.${GROUP} /var/log/audit/audit.log*
  else
    chown root.root /var/log/audit
    chown root.root /var/log/audit/audit.log*
  fi
else
  chown root.root /var/log/audit
  chown root.root /var/log/audit/audit.log*
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_ownership_var_log_audit:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_suid_privilege_function" selected="false" severity="medium">
              <version>SLES-12-020240</version>
              <title xml:lang="en-US">Record Events When Privileged Executables Are Run</title>
              <description xml:lang="en-US">Verify the SUSE operating system generates an audit record when privileged functions are executed.

Find relevant setuid and setgid programs using the following command once for each local system partition, replacing "[PARTITION]" with each local system partition:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo find [PARTITION] -xdev -type f \( -perm -4000 -o -perm -2000 \) 2&gt;/dev/null</html:pre>

Verify all of the programs found with the command above are listed in the audit file by running the following command for every program found, replacing "[FILE_PATH]" with each program to include the full path:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep [FILE_PATH] /etc/audit/audit.rules

-w [SETUID_FILE_PATH] -p wa -k privilege_function</html:pre>

All setuid and setgid programs on the system must have a corresponding audit rule, or there must be an audit rule for the subdirectory that contains the setuid/setgid file.</description>
              <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect.</warning>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020240</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92019r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001814</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001875</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001877</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001878</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001879</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001880</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001881</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001882</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001889</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001914</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002234</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-5(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-7(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-7(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(3)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-6(9)</reference>
              <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have
compromised information system accounts, is a serious and ongoing concern
and can have significant adverse impacts on organizations. Auditing the use
of privileged functions is one way to detect such misuse and identify the
risk from insider threats and the advanced persistent threat.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_suid_privilege_function" system="urn:xccdf:fix:script:sh">
IFS='
'

for fs in $(df --local --output=target | tail -n +2) ; do
    for f in $(find "$fs" -xdev -type f \( -perm -4000 -o -perm -2000 \) \( -perm -100 -o -perm -10 -o -perm -1 \) ) ; do
        fix_audit_watch_rule auditctl "$f" "xwa" "audit_rules_usergroup_modification"
        fix_audit_watch_rule augenrules "$f" "xwa" "audit_rules_usergroup_modification"
    done
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_suid_privilege_function:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_suid_privilege_function_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_enable_syscall_auditing" selected="false" severity="medium">
              <title xml:lang="en-US">Remove Default Configuration to Disable Syscall Auditing</title>
              <description xml:lang="en-US">By default, SUSE Linux Enterprise 12 ships an audit rule to disable syscall auditing for performance reasons.

To make sure that syscall auditing works, this line must be removed from <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d/audit.rules</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a task,never</html:pre></description>
              <rationale xml:lang="en-US">Audit rules for syscalls do not take effect unless this line is removed.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="audit_rules_enable_syscall_auditing" system="urn:xccdf:fix:script:sh">

for f in /etc/audit/audit.rules /etc/audit/rules.d/*.rules ; do
    sed -E -i --follow-symlinks 's/^(\s*-a\s+task,never)/#\1/' "$f"
done
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-audit_rules_enable_syscall_auditing:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-audit_rules_enable_syscall_auditing_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_audit_dac_actions">
              <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. Note that the "-F arch=b32" lines should be
present even on a 64 bit system. These commands identify system calls for
auditing. Even if the system is 64 bit it can still execute 32 bit system
calls. Additionally, these rules can be configured in a number of ways while
still achieving the desired effect. An example of this is that the "-S" calls
could be split up and placed on separate lines, however, this is less efficient.
Add the following to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod
    -a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod
    -a always,exit -F arch=b32 -S setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If your system is 64 bit then these lines should be duplicated and the
arch=b32 replaced with arch=b64 as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod
    -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod
    -a always,exit -F arch=b64 -S setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="false" severity="medium">
                <version>SLES-12-020460</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to
use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup
(the default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in
the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S chmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S chmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S chmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S chmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect.  Here the system calls
have been placed independent of other system calls.  Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020460</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92063r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_chmod" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'chmod' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S chmod.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_chmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="false" severity="medium">
                <version>SLES-12-020420</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chown</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to
use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup
(the default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in
the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S chown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S chown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S chown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S chown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect.  Here the system calls
have been placed independent of other system calls.  Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020420</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92055r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000474-GPOS-00219</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_chown" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'chown' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S chown.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S chown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_chown:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="false" severity="medium">
                <version>SLES-12-020470</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to
use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup
(the default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in
the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020470</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92065r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fchmod" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fchmod' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fchmod.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fchmod -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fchmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="false" severity="medium">
                <version>SLES-12-020480</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmodat</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to
use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup
(the default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in
the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020480</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92067r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fchmodat" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fchmodat' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fchmodat.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fchmodat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="false" severity="medium">
                <version>SLES-12-020430</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchown</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020430</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92057r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000474-GPOS-00219</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fchown" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fchown' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fchown.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fchown:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="false" severity="medium">
                <version>SLES-12-020450</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchownat</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchownat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchownat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fchownat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fchownat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020450</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92061r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000474-GPOS-00219</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fchownat" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fchownat' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fchownat.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fchownat -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fchownat:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="false" severity="medium">
                <version>SLES-12-020410</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fremovexattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020410</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92053r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fremovexattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fremovexattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fremovexattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="false" severity="medium">
                <version>SLES-12-020380</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fsetxattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S fsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S fsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020380</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92047r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_fsetxattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'fsetxattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S fsetxattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S fsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="false" severity="medium">
                <version>SLES-12-020440</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lchown</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020440</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92059r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000474-GPOS-00219</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_lchown" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'lchown' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S lchown.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S lchown -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_lchown:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="false" severity="medium">
                <version>SLES-12-020400</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lremovexattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020400</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92051r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_lremovexattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'lremovexattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S lremovexattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S lremovexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="false" severity="medium">
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lsetxattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S lsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S lsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000474-GPOS-00219</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_lsetxattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'lsetxattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S lsetxattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S lsetxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="false" severity="medium">
                <version>SLES-12-020390</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - removexattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code>
program to read audit rules during daemon startup (the default), add the
following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S removexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S removexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S removexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S removexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020390</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92049r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_removexattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'removexattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S removexattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S removexattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_removexattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="false" severity="medium">
                <version>SLES-12-020370</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - setxattr</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S setxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S setxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S setxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S setxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020370</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92045r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000474-VMM-001940</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_setxattr" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'setxattr' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S setxattr.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S setxattr -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_setxattr:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_mount" selected="false" severity="medium">
                <version>SLES-12-020290</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - mount</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file system mount
changes. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S mount -F auid&gt;=1000 -F auid!=unset -F key=privileged-mount</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S mount -F auid&gt;=1000 -F auid!=unset -F key=privileged-mount</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S mount -F auid&gt;=1000 -F auid!=unset -F key=privileged-mount</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S mount -F auid&gt;=1000 -F auid!=unset -F key=privileged-mount</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020290</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92029r2_rule</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_mount" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'mount' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S mount.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S mount -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_mount:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_mount_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_umount" selected="false" severity="medium">
                <version>SLES-12-020300</version>
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - umount</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file system umount
changes. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S umount -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S umount -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020300</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92031r2_rule</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_umount" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'umount' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S umount.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S umount -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_umount:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_umount_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_umount2" selected="false" severity="medium">
                <title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - umount2</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect file system umount2
changes. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S umount2 -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount2</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S umount2 -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount2</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S umount2 -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount2</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S umount2 -F auid&gt;=1000 -F auid!=unset -F key=privileged-umount2</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_dac_modification_umount2" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# the umount syscall only exists for the 32bit architecture, so only ever generate a 32bit rule for it
if [ "$(getconf LONG_BIT)" = "32" ] || [ 'umount2' = umount ] ; then
	RULE_ARCHS=("b32")
else
	RULE_ARCHS=("b32" "b64")
fi

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S umount2.*"
	GROUP="perm_mod"
	FULL_RULE="-a always,exit -F arch=$ARCH -S umount2 -F auid&gt;=1000 -F auid!=unset -F key=perm_mod"

	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_dac_modification_umount2:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_dac_modification_umount2_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_execution_selinux_commands">
              <title xml:lang="en-US">Record Execution Attempts to Run SELinux Privileged Commands</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
SELinux privileged commands for all users and root.</description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon" selected="false" severity="medium">
                <version>SLES-12-020630</version>
                <title xml:lang="en-US">Record Any Attempts to Run chcon</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">chcon</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged-priv_change</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged-priv_change</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020630</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92097r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000463-GPOS-00207</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000465-GPOS-00209</reference>
                <reference href="">SRG-OS-000463-VMM-001850</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_chcon" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chcon\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_chcon:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_chcon_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_chacl" selected="false" severity="medium">
                <version>SLES-12-020620</version>
                <title xml:lang="en-US">Record Any Attempts to Run chacl</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">chacl</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020620</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92095r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_chacl" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chacl\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chacl -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_chacl:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_chacl_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_chmod" selected="false" severity="medium">
                <version>SLES-12-020600</version>
                <title xml:lang="en-US">Record Any Attempts to Run chmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">chmod</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chmod -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chmod -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020600</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92091r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_chmod" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chmod\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chmod -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_chmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_chmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_crontab" selected="false" severity="medium">
                <version>SLES-12-020710</version>
                <title xml:lang="en-US">Record Any Attempts to Run crontab</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">crontab</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020710</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92113r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_crontab" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/crontab\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_crontab:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_crontab_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_rm" selected="false" severity="medium">
                <version>SLES-12-020640</version>
                <title xml:lang="en-US">Record Any Attempts to Run rm</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">rm</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/rm -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/rm -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020640</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92099r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_rm" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/rm\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/rm -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_rm:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_rm_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_setfacl" selected="false" severity="medium">
                <version>SLES-12-020610</version>
                <title xml:lang="en-US">Record Any Attempts to Run setfacl</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">setfacl</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid&gt;=1000 -F auid!=unset -k prim_mod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020610</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92093r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_setfacl" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/setfacl\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_setfacl:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_setfacl_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_execution_ssh-agent" selected="false" severity="medium">
                <version>SLES-12-020310</version>
                <title xml:lang="en-US">Record Any Attempts to Run ssh-agent</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect any execution attempt
of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">ssh-agent</html:code> command for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>
daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules
during daemon startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-ssh-agent</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-ssh-agent</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020310</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92033r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_execution_ssh-agent" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/ssh-agent\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_execution_ssh-agent:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_execution_ssh-agent_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_file_deletion_events">
              <title xml:lang="en-US">Record File Deletion Events by User</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect file deletion events
for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat -F auid&gt;=1000 -F auid!=unset -F key=delete</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat -F auid&gt;=1000 -F auid!=unset -F key=delete</html:pre></description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure auditd Collects File Deletion Events by User</title>
                <description xml:lang="en-US">At a minimum the audit system should collect file deletion events
for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat -F auid&gt;=1000 -F auid!=unset -F key=delete</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename -S renameat -F auid&gt;=1000 -F auid!=unset -F key=delete</html:pre></description>
                <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to file deletion;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_file_deletion_events_rmdir</html:code></html:li><html:li><html:code>audit_rules_file_deletion_events_unlink</html:code></html:li><html:li><html:code>audit_rules_file_deletion_events_unlinkat</html:code></html:li></html:ul></warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
                <rationale xml:lang="en-US">Auditing file deletions will create an audit trail for files that are removed
from the system. The audit trail could aid in system troubleshooting, as well as, detecting
malicious processes that attempt to delete log files to conceal their presence.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_kernel_module_loading">
              <title xml:lang="en-US">Record Information on Kernel Modules Loading and Unloading</title>
              <description xml:lang="en-US">To capture kernel module loading and unloading events, use following lines, setting ARCH to
either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-w /usr/sbin/insmod -p x -k modules
-w /usr/sbin/rmmod -p x -k modules
-w /usr/sbin/modprobe -p x -k modules
-a always,exit -F arch=<html:i>ARCH</html:i> -S init_module,delete_module -F key=modules
</html:pre>

Place to add the lines depends on a way <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured. If it is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program (the default), add the lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>.

If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility,
add the lines to file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>.</description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Loading and Unloading</title>
                <description xml:lang="en-US">To capture kernel module loading and unloading events, use following lines, setting ARCH to
either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-w /usr/sbin/insmod -p x -k modules
-w /usr/sbin/rmmod -p x -k modules
-w /usr/sbin/modprobe -p x -k modules

-a always,exit -F arch=<html:i>ARCH</html:i> -S init_module,finit_module,create_module,delete_module -F key=modules

</html:pre>

The place to add the lines depends on a way <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured. If it is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program (the default), add the lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>.

If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility,
add the lines to file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>.</description>
                <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to kernel module loading and unloading;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_kernel_module_loading_insmod</html:code></html:li><html:li><html:code>audit_rules_kernel_module_loading_rmmod</html:code></html:li><html:li><html:code>audit_rules_kernel_module_loading_modprobe</html:code></html:li></html:ul></warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.17</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
                <rationale xml:lang="en-US">The addition/removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete" selected="false" severity="medium">
                <version>SLES-12-020730</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Unloading - delete_module</title>
                <description xml:lang="en-US">To capture kernel module unloading events, use following line, setting ARCH to
either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=<html:i>ARCH</html:i> -S delete_module -F key=modules</html:pre>

Place to add the line depends on a way <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured. If it is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program (the default), add the line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>.

If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility,
add the line to file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020730</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92117r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.17</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00216</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000477-GPOS-00222</reference>
                <reference href="">SRG-OS-000477-VMM-001970</reference>
                <rationale xml:lang="en-US">The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_kernel_module_loading_delete" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# Note: 32-bit and 64-bit kernel syscall numbers not always line up =&gt;
#       it's required on a 64-bit system to check also for the presence
#       of 32-bit's equivalent of the corresponding rule.
#       (See `man 7 audit.rules` for details )
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S delete_module \(-F key=\|-k \).*"
	GROUP="modules"
	FULL_RULE="-a always,exit -F arch=$ARCH -S delete_module -k modules"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_kernel_module_loading_delete:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_kernel_module_loading_delete_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_finit" selected="false" severity="medium">
                <version>SLES-12-020740</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program
to read audit rules during daemon startup (the default), add the following lines to a file
with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> to capture kernel module
loading and unloading events, setting ARCH to either b32 or b64 as appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=<html:i>ARCH</html:i> -S finit_module -F key=modules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility to read audit
rules during daemon startup, add the following lines to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file
in order to capture kernel module loading and unloading events, setting ARCH to either b32 or
b64 as appropriate for your system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=<html:i>ARCH</html:i> -S finit_module -F key=modules</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020740</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92119r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.17</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00216</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000477-GPOS-00222</reference>
                <reference href="">SRG-OS-000477-VMM-001970</reference>
                <rationale xml:lang="en-US">The addition/removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_kernel_module_loading_finit" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# Note: 32-bit and 64-bit kernel syscall numbers not always line up =&gt;
#       it's required on a 64-bit system to check also for the presence
#       of 32-bit's equivalent of the corresponding rule.
#       (See `man 7 audit.rules` for details )
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S finit_module \(-F key=\|-k \).*"
	GROUP="modules"
	FULL_RULE="-a always,exit -F arch=$ARCH -S finit_module -k modules"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_kernel_module_loading_finit:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_kernel_module_loading_finit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init" selected="false" severity="medium">
                <version>SLES-12-020750</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Loading - init_module</title>
                <description xml:lang="en-US">To capture kernel module loading events, use following line, setting ARCH to
either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=<html:i>ARCH</html:i> -S init_module -F key=modules</html:pre>

Place to add the line depends on a way <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured. If it is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program (the default), add the line to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>.

If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility,
add the line to file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020750</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92121r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.17</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.7</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00216</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000477-GPOS-00222</reference>
                <reference href="">SRG-OS-000477-VMM-001970</reference>
                <rationale xml:lang="en-US">The addition of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_kernel_module_loading_init" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# Note: 32-bit and 64-bit kernel syscall numbers not always line up =&gt;
#       it's required on a 64-bit system to check also for the presence
#       of 32-bit's equivalent of the corresponding rule.
#       (See `man 7 audit.rules` for details )
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S init_module \(-F key=\|-k \).*"
	GROUP="modules"
	FULL_RULE="-a always,exit -F arch=$ARCH -S init_module -k modules"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_kernel_module_loading_init:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_kernel_module_loading_init_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_login_events">
              <title xml:lang="en-US">Record Attempts to Alter Logon and Logout Events</title>
              <description xml:lang="en-US">The audit system already collects login information for all users
and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock/ -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for unattempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock/ -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre></description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="false" severity="medium">
                <title xml:lang="en-US">Record Attempts to Alter Logon and Logout Events</title>
                <description xml:lang="en-US">The audit system already collects login information for all users
and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for unattempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre></description>
                <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to login events;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_login_events_tallylog</html:code></html:li><html:li><html:code>audit_rules_login_events_faillock</html:code></html:li><html:li><html:code>audit_rules_login_events_lastlog</html:code></html:li></html:ul></warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.3</reference>
                <rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</rationale>
                <platform idref="cpe:/a:machine"/>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events_lastlog" selected="false" severity="medium">
                <version>SLES-12-020660</version>
                <title xml:lang="en-US">Record Attempts to Alter Logon and Logout Events - lastlog</title>
                <description xml:lang="en-US">The audit system already collects login information for all users
and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/lastlog -p wa -k logins</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for unattempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/lastlog -p wa -k logins</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020660</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92103r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.3</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000470-GPOS-00214</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000473-GPOS-00218</reference>
                <reference href="">SRG-OS-000473-VMM-001930</reference>
                <reference href="">SRG-OS-000470-VMM-001900</reference>
                <rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_login_events_lastlog" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/var/log/lastlog" "wa" "logins"
fix_audit_watch_rule "augenrules" "/var/log/lastlog" "wa" "logins"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_login_events_lastlog:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_login_events_lastlog_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events_tallylog" selected="false" severity="medium">
                <version>SLES-12-020650</version>
                <title xml:lang="en-US">Record Attempts to Alter Logon and Logout Events - tallylog</title>
                <description xml:lang="en-US">The audit system already collects login information for all users
and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for unattempted manual
edits of files involved in storing logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/tallylog -p wa -k logins</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020650</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92101r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.3</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000470-GPOS-00214</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000473-GPOS-00218</reference>
                <reference href="">SRG-OS-000473-VMM-001930</reference>
                <reference href="">SRG-OS-000470-VMM-001900</reference>
                <rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_login_events_tallylog" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/var/log/tallylog" "wa" "logins"
fix_audit_watch_rule "augenrules" "/var/log/tallylog" "wa" "logins"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_login_events_tallylog:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_login_events_tallylog_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events_faillog" selected="false" severity="medium">
                <version>SLES-12-020760</version>
                <title xml:lang="en-US">Record Attempts to Alter Failed Logon and Logout Events - faillog</title>
                <description xml:lang="en-US">The audit system already collects login information for all users
and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following lines to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> in order to watch for attempted manual
edits of files involved in storing failed logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/faillog -p wa -k logins</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file in order to watch for unattempted manual
edits of files involved in storing failed logon events:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /var/log/faillog -p wa -k logins</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020760</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92123r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000126</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_login_events_faillog" system="urn:xccdf:fix:script:sh">

# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy"/>
fix_audit_watch_rule "auditctl" "/var/log/faillog" "wa" "logins"
fix_audit_watch_rule "augenrules" "/var/log/faillog" "wa" "logins"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_login_events_faillog:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_login_events_faillog_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_privileged_commands">
              <title xml:lang="en-US">Record Information on the Use of Privileged Commands</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root.</description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. To find the relevant setuid /
setgid programs, run the following command for each local partition
<html:i xmlns:html="http://www.w3.org/1999/xhtml">PART</html:i>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo find <html:i>PART</html:i> -xdev -type f -perm -4000 -o -type f -perm -2000 2&gt;/dev/null</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code>
program to read audit rules during daemon startup (the default), add a line of
the following form to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> for each setuid / setgid program on the system,
replacing the <html:i xmlns:html="http://www.w3.org/1999/xhtml">SETUID_PROG_PATH</html:i> part with the full path of that setuid /
setgid program in the list:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=<html:i>SETUID_PROG_PATH</html:i> -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> for each setuid / setgid program on the
system, replacing the <html:i xmlns:html="http://www.w3.org/1999/xhtml">SETUID_PROG_PATH</html:i> part with the full path of that
setuid / setgid program in the list:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=<html:i>SETUID_PROG_PATH</html:i> -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to privileged commands;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_privileged_commands_su</html:code></html:li><html:li><html:code>audit_rules_privileged_commands_umount</html:code></html:li><html:li><html:code>audit_rules_privileged_commands_passwd</html:code></html:li></html:ul></warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO08.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002234</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(4)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-6(9)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-2</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.DP-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.CO-2</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.2</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000327-GPOS-00127</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage" selected="false" severity="medium">
                <version>SLES-12-020690</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - chage</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chage -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chage -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020690</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92109r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_chage" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chage\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chage -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_chage:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_chage_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh" selected="false" severity="medium">
                <version>SLES-12-020580</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - chsh</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020580</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92087r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_chsh" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chsh\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_chsh:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_chsh_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd" selected="false" severity="medium">
                <version>SLES-12-020560</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020560</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92083r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_gpasswd" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/gpasswd\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_gpasswd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_gpasswd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp" selected="false" severity="medium">
                <version>SLES-12-020570</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - newgrp</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020570</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92085r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_newgrp" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/newgrp\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_newgrp:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_newgrp_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_pam_timestamp_check" selected="false" severity="medium">
                <version>SLES-12-020720</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020720</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92115r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_pam_timestamp_check" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/sbin/pam_timestamp_check\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/sbin/pam_timestamp_check -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_pam_timestamp_check:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_pam_timestamp_check_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd" selected="false" severity="medium">
                <version>SLES-12-020550</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - passwd</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020550</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92081r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_passwd" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/passwd\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_passwd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_passwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_ssh_keysign" selected="false" severity="medium">
                <version>SLES-12-020320</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/lib/ssh/key-sign -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>

If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/lib/ssh/key-sign -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020320</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92035r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_ssh_keysign" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/lib/ssh/ssh-keysign\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/lib/ssh/ssh-keysign -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_ssh_keysign:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_ssh_keysign_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su" selected="false" severity="medium">
                <version>SLES-12-020250</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - su</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/su -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/su -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020250</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92021r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_su" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/su\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/su -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_su:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_su_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo" selected="false" severity="medium">
                <version>SLES-12-020260</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - sudo</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/sudo -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/sudo -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020260</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92023r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_sudo" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/sudo\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/sudo -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_sudo:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_sudo_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit" selected="false" severity="medium">
                <version>SLES-12-020270</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020270</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92025r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_sudoedit" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/sudoedit\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_sudoedit:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_sudoedit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd" selected="false" severity="medium">
                <version>SLES-12-020680</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/unix_chkpwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/unix_chkpwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020680</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92107r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000135</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000042-GPOS-00020</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000471-GPOS-00215</reference>
                <reference href="">SRG-OS-000471-VMM-001910</reference>
                <rationale xml:lang="en-US">Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threast.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_unix_chkpwd" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/sbin/unix_chkpwd\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/sbin/unix_chkpwd -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_unix_chkpwd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chfn" selected="false" severity="medium">
                <version>SLES-12-020280</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - chfn</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chfn -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged-chfn</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/chfn -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged-chfn</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020280</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92027r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_chfn" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/chfn\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/chfn -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_chfn:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_chfn_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_insmod" selected="false" severity="medium">
                <version>SLES-12-020330</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - insmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/insmod -p x -k modules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/insmod -p x -k modules</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020330</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92037r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_insmod" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/sbin/insmod\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/sbin/insmod -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_insmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_insmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod" selected="false" severity="medium">
                <version>SLES-12-020360</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - kmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /usr/bin/kmod -p x -k modules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /usr/bin/kmod -p x -k modules</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020360</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92043r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_kmod" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/kmod\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/kmod -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_kmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_kmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_modprobe" selected="false" severity="medium">
                <version>SLES-12-020350</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - modprobe</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/modprobe -p x -k modules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/modprobe -p x -k modules</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020350</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92041r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_modprobe" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/sbin/modprobe\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/sbin/modprobe -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_modprobe:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_modprobe_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passmass" selected="false" severity="medium">
                <version>SLES-12-020670</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - passmass</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/passmass -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-passmass</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/passmass -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-passmass</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020670</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92105r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_passmass" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/bin/passmass\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/bin/passmass -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_passmass:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_passmass_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_rmmod" selected="false" severity="medium">
                <version>SLES-12-020340</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - rmmod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/rmmod -p x -k modules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /sbin/rmmod -p x -k modules</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020340</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92039r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_rmmod" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/sbin/rmmod\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/sbin/rmmod -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_rmmod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_rmmod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_usermod" selected="false" severity="medium">
                <version>SLES-12-020700</version>
                <title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands - usermod</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is
configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/usermod -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-usermod</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add a line of the following
form to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F path=/usr/bin/usermod -F perm=x -F auid&gt;=1000 -F auid!=unset -k privileged-usermod</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020700</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92111r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4(1)(a)</reference>
                <rationale xml:lang="en-US">Without generating audit records that are specific to the security and
mission needs of the organization, it would be difficult to establish,
correlate, and investigate the events relating to an incident or identify
those responsible for one.

Audit records can be generated from various components within the
information system (e.g., module or policy filter).</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_privileged_commands_usermod" system="urn:xccdf:fix:script:sh">

PATTERN="-a always,exit -F path=/usr/sbin/usermod\\s\\+.*"
GROUP="privileged"
# Although the fix doesn't use ARCH, we reset it because it could have been set by some other remediation
ARCH=""
FULL_RULE="-a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid&gt;=1000 -F auid!=unset -F key=privileged"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_privileged_commands_usermod:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_privileged_commands_usermod_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_time_rules">
              <title xml:lang="en-US">Records Events that Modify Date and Time Information</title>
              <description xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time. All changes to the system
time should be audited.</description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="false" severity="medium">
                <title xml:lang="en-US">Record attempts to alter time through adjtimex</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S adjtimex -F key=audit_time_rules</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex -F key=audit_time_rules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S adjtimex -F key=audit_time_rules</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex -F key=audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can be
used for better reporting capability through ausearch and aureport. Multiple
system calls can be defined on the same line to save space if desired, but is
not required. See an example of multiple combined syscalls:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex,settimeofday -F key=audit_time_rules</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001487</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.2.b</reference>
                <rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="false" severity="medium">
                <title xml:lang="en-US">Record Attempts to Alter Time Through clock_settime</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex,settimeofday -F key=audit_time_rules</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001487</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.2.b</reference>
                <rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="false" severity="medium">
                <title xml:lang="en-US">Record attempts to alter time through settimeofday</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S settimeofday -F key=audit_time_rules</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S settimeofday -F key=audit_time_rules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S settimeofday -F key=audit_time_rules</html:pre>
If the system is 64 bit then also add the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S settimeofday -F key=audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can be
used for better reporting capability through ausearch and aureport. Multiple
system calls can be defined on the same line to save space if desired, but is
not required. See an example of multiple combined syscalls:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex,settimeofday -F key=audit_time_rules</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001487</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.2.b</reference>
                <rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="false" severity="medium">
                <title xml:lang="en-US">Record Attempts to Alter Time Through stime</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the
directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code> for both 32 bit and 64 bit systems:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S stime -F key=audit_time_rules</html:pre>
Since the 64 bit version of the "stime" system call is not defined in the audit
lookup table, the corresponding "-F arch=b64" form of this rule is not expected
to be defined on 64 bit systems (the aforementioned "-F arch=b32" stime rule
form itself is sufficient for both 32 bit and 64 bit systems). If the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code> utility to
read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file for both 32 bit and 64 bit systems:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S stime -F key=audit_time_rules</html:pre>
Since the 64 bit version of the "stime" system call is not defined in the audit
lookup table, the corresponding "-F arch=b64" form of this rule is not expected
to be defined on 64 bit systems (the aforementioned "-F arch=b32" stime rule
form itself is sufficient for both 32 bit and 64 bit systems). The -k option
allows for the specification of a key in string form that can be used for
better reporting capability through ausearch and aureport. Multiple system
calls can be defined on the same line to save space if desired, but is not
required. See an example of multiple combined system calls:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S adjtimex,settimeofday -F key=audit_time_rules</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001487</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.2.b</reference>
                <rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="false" severity="medium">
                <title xml:lang="en-US">Record Attempts to Alter the localtime File</title>
                <description xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon startup (the default),
add the following line to a file with suffix <html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/localtime -p wa -k audit_time_rules</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-w /etc/localtime -p wa -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport and
should always be used.</description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001487</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.4.2.b</reference>
                <rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_audit_unsuccessful_file_modification">
              <title xml:lang="en-US">Record Unauthorized Access Attempts Events to Files (unsuccessful)</title>
              <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. Note that the "-F arch=b32" lines should be
present even on a 64 bit system. These commands identify system calls for
auditing. Even if the system is 64 bit it can still execute 32 bit system
calls. Additionally, these rules can be configured in a number of ways while
still achieving the desired effect. An example of this is that the "-S" calls
could be split up and placed on separate lines, however, this is less efficient.
Add the following to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
    -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If your system is 64 bit then these lines should be duplicated and the
arch=b32 replaced with arch=b64 as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
    -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="false" severity="medium">
                <title xml:lang="en-US">Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</title>
                <description xml:lang="en-US">At a minimum the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">This rule checks for multiple syscalls related to unsuccessful file modification;
it was written with DISA STIG in mind. Other policies should use a
separate rule for each syscall that needs to be checked. For example:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>audit_rules_unsuccessful_file_modification_open</html:code></html:li><html:li><html:code>audit_rules_unsuccessful_file_modification_ftruncate</html:code></html:li><html:li><html:code>audit_rules_unsuccessful_file_modification_creat</html:code></html:li></html:ul></warning>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_creat" selected="false" severity="medium">
                <version>SLES-12-020520</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - creat</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020520</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92075r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_creat" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S creat -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S creat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S creat -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S creat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_creat:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_creat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_ftruncate" selected="false" severity="medium">
                <version>SLES-12-020510</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - ftruncate</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S ftruncate -F exiu=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020510</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92073r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_ftruncate" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S ftruncate -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S ftruncate -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_ftruncate:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_ftruncate_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_open" selected="false" severity="medium">
                <version>SLES-12-020490</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - open</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S open -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S open -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S open -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S open -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S open -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S open -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S open -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S open -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020490</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92069r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_open" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S open -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S open -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S open -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S open -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_open:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_open_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_open_by_handle_at" selected="false" severity="medium">
                <version>SLES-12-020540</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - open_by_handle_at</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020540</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92079r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_open_by_handle_at" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S open_by_handle_at -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S open_by_handle_at -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S open_by_handle_at -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S open_by_handle_at -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_open_by_handle_at_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_openat" selected="false" severity="medium">
                <version>SLES-12-020530</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - openat</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S openat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S openat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S openat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S openat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S openat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S openat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S openat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S openat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020530</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92077r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_openat" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S openat -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S openat -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S openat -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S openat -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_openat:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_openat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification_truncate" selected="false" severity="medium">
                <version>SLES-12-020500</version>
                <title xml:lang="en-US">Record Unauthorized Access Attempts to Files (unsuccessful) - truncate</title>
                <description xml:lang="en-US">At a minimum, the audit system should collect unauthorized file
accesses for all users and root. If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured
to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">augenrules</html:code> program to read audit rules during daemon
startup (the default), add the following lines to a file with suffix
<html:code xmlns:html="http://www.w3.org/1999/xhtml">.rules</html:code> in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/rules.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S truncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S truncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S truncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S truncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> daemon is configured to use the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditctl</html:code>
utility to read audit rules during daemon startup, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/audit.rules</html:code> file:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-a always,exit -F arch=b32 -S truncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b32 -S truncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre>
If the system is 64 bit then also add the following lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
-a always,exit -F arch=b64 -S truncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access
-a always,exit -F arch=b64 -S truncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access</html:pre></description>
                <warning xml:lang="en-US" category="general">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000130</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000169</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020500</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92071r2_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.10</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000172</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002884</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(i)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(7)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.4</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.2.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000064-GPOS-00033</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000458-GPOS-00203</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000461-GPOS-00205</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000392-GPOS-00172</reference>
                <reference href="">SRG-OS-000458-VMM-001810</reference>
                <reference href="">SRG-OS-000461-VMM-001830</reference>
                <rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="audit_rules_unsuccessful_file_modification_truncate" system="urn:xccdf:fix:script:sh">

# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] &amp;&amp; RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")

for ARCH in "${RULE_ARCHS[@]}"
do
	PATTERN="-a always,exit -F arch=$ARCH -S truncate -F exit=-EACCES.*"
	GROUP="access"
	FULL_RULE="-a always,exit -F arch=$ARCH -S truncate -F exit=-EACCES -F auid&gt;=1000 -F auid!=unset -F key=access"
	# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
	fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
	fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done

for ARCH in "${RULE_ARCHS[@]}"
do
        PATTERN="-a always,exit -F arch=$ARCH -S truncate -F exit=-EPERM.*"
        GROUP="access"
        FULL_RULE="-a always,exit -F arch=$ARCH -S truncate -F exit=-EPERM -F auid&gt;=1000 -F auid!=unset -F key=access"
        # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
<sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy"/>
        fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
        fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-audit_rules_unsuccessful_file_modification_truncate:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-audit_rules_unsuccessful_file_modification_truncate_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_configure_auditd_data_retention">
            <title xml:lang="en-US">Configure auditd Data Retention</title>
            <description xml:lang="en-US">The audit system writes data to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit/audit.log</html:code>. By default,
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> rotates 5 logs by size (6MB), retaining a maximum of 30MB of
data in total, and refuses to write entries when the disk is too
full. This minimizes the risk of audit data filling its partition
and impacting other services. This also minimizes the risk of the audit
daemon temporarily disabling the system if it cannot write audit log (which
it can be configured to do).

For a busy
system or a system which is thoroughly auditing system activity, the default settings
for data retention may be
 insufficient. The log file size needed will depend heavily on what types
of events are being audited. First configure auditing to log all the events of
interest. Then monitor the log size manually for awhile to determine what file
size will allow you to keep the required data for the correct time period.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Using a dedicated partition for <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit</html:code> prevents the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> logs from disrupting system functionality if they fill, and,
more importantly, prevents other activity in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var</html:code> from filling the
partition and stopping the audit trail. (The audit logs are size-limited and
therefore unlikely to grow without bound unless configured to do so.) Some
machines may have requirements that no actions occur which cannot be audited.
If this is the case, then <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> can be configured to halt the machine
if it runs out of space. <html:b xmlns:html="http://www.w3.org/1999/xhtml">Note:</html:b> Since older logs are rotated,
configuring <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> this way does not prevent older logs from being
rotated away before they can be viewed.

<html:i xmlns:html="http://www.w3.org/1999/xhtml">If your system is configured to halt when logging cannot be performed, make
sure this can never happen under normal circumstances! Ensure that
<html:code>/var/log/audit</html:code> is on its own partition, and that this partition is
larger than the maximum amount of data <html:code>auditd</html:code> will retain
normally.</html:i></description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_var_audispd_disk_full_action" type="string">
              <title xml:lang="en-US">Action for audispd to take when disk is full</title>
              <description xml:lang="en-US">The setting for disk_full_action in /etc/audisp/audisp-remote.conf</description>
              <value>single</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="suspend">suspend</value>
              <value selector="syslog">syslog</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_audispd_network_failure_action" type="string">
              <title xml:lang="en-US">Action for audispd to take when network fails</title>
              <description xml:lang="en-US">The setting for network_failure_action in /etc/audisp/audisp-remote.conf</description>
              <value>single</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="suspend">suspend</value>
              <value selector="syslog">syslog</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_audispd_remote_server" type="string" interactive="true">
              <title xml:lang="en-US">Remote server for audispd to send audit records</title>
              <description xml:lang="en-US">
The setting for remote_server in /etc/audisp/audisp-remote.conf</description>
              <value>myhost.mydomain.com</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" type="string">
              <title xml:lang="en-US">Account for auditd to send email when actions occurs</title>
              <description xml:lang="en-US">The setting for action_mail_acct in /etc/audit/auditd.conf</description>
              <value selector="admin">admin</value>
              <value>root</value>
              <value selector="root">root</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" type="string">
              <title xml:lang="en-US">Action for auditd to take when disk space is low</title>
              <description xml:lang="en-US">The setting for admin_space_left_action in /etc/audit/auditd.conf</description>
              <value>single</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="suspend">suspend</value>
              <value selector="syslog">syslog</value>
              <value selector="rotate">rotate</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_disk_error_action" type="string">
              <title xml:lang="en-US">Action for auditd to take when disk errors</title>
              <description xml:lang="en-US">The setting for disk_error_action in /etc/audit/auditd.conf</description>
              <value>single</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="syslog">syslog</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_disk_full_action" type="string">
              <title xml:lang="en-US">Action for auditd to take when disk is full</title>
              <description xml:lang="en-US">The setting for disk_full_action in /etc/audit/auditd.conf</description>
              <value>single</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="syslog">syslog</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_flush" type="string">
              <title xml:lang="en-US">Auditd priority for flushing data to disk</title>
              <description xml:lang="en-US">The setting for flush in /etc/audit/auditd.conf</description>
              <value selector="data">data</value>
              <value>data</value>
              <value selector="incremental">incremental</value>
              <value selector="incremental_async">incremental_async</value>
              <value selector="none">none</value>
              <value selector="sync">sync</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" type="number">
              <title xml:lang="en-US">Maximum audit log file size for auditd</title>
              <description xml:lang="en-US">The setting for max_log_size in /etc/audit/auditd.conf</description>
              <value selector="1">1</value>
              <value selector="10">10</value>
              <value selector="20">20</value>
              <value selector="5">5</value>
              <value selector="6">6</value>
              <value>6</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" type="string">
              <title xml:lang="en-US">Action for auditd to take when log files reach their maximum size</title>
              <description xml:lang="en-US">The setting for max_log_file_action in /etc/audit/auditd.conf</description>
              <value>rotate</value>
              <value selector="keep_logs">keep_logs</value>
              <value selector="rotate">rotate</value>
              <value selector="suspend">suspend</value>
              <value selector="syslog">syslog</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_num_logs" type="number">
              <title xml:lang="en-US">Number of log files for auditd to retain</title>
              <description xml:lang="en-US">The setting for num_logs in /etc/audit/auditd.conf</description>
              <value selector="0">0</value>
              <value selector="1">1</value>
              <value selector="2">2</value>
              <value selector="3">3</value>
              <value selector="4">4</value>
              <value selector="5">5</value>
              <value>5</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" type="string">
              <title xml:lang="en-US">Action for auditd to take when disk space just starts to run low</title>
              <description xml:lang="en-US">The setting for space_left_action in /etc/audit/auditd.conf</description>
              <value>email</value>
              <value selector="email">email</value>
              <value selector="exec">exec</value>
              <value selector="halt">halt</value>
              <value selector="single">single</value>
              <value selector="suspend">suspend</value>
              <value selector="syslog">syslog</value>
              <value selector="rotate">rotate</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditd_space_left" type="number">
              <title xml:lang="en-US">Size remaining in disk space before prompting space_left_action</title>
              <description xml:lang="en-US">The setting for space_left (MB) in /etc/audit/auditd.conf</description>
              <value selector="1000MB">1000</value>
              <value selector="100MB">100</value>
              <value selector="250MB">250</value>
              <value selector="500MB">500</value>
              <value selector="750MB">750</value>
              <value>100</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_configure_remote_server" selected="false" severity="medium">
              <version>SLES-12-020090</version>
              <title xml:lang="en-US">Configure audispd Plugin To Send Logs To Remote Server</title>
              <description xml:lang="en-US">Configure the audispd plugin to off-load audit records onto a different
system or media from the system being audited.
Set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">remote_server</html:code> option in <html:pre xmlns:html="http://www.w3.org/1999/xhtml">/etc/audisp/audisp-remote.conf</html:pre>
with an IP address or hostname of the system that the audispd plugin should
send audit records to. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">remote_server = <sub idref="xccdf_org.ssgproject.content_value_var_audispd_remote_server" use="legacy"/></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020090</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92001r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000342-GPOS-00133</reference>
              <reference href="">SRG-OS-000051-VMM-000230</reference>
              <reference href="">SRG-OS-000058-VMM-000270</reference>
              <reference href="">SRG-OS-000059-VMM-000280</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <rationale xml:lang="en-US">Information stored in one location is vulnerable to accidental or incidental
deletion or alteration. Off-loading is a common process in information systems
with limited audit storage capacity.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_audispd_configure_remote_server" system="urn:xccdf:fix:script:sh">
var_audispd_remote_server="<sub idref="xccdf_org.ssgproject.content_value_var_audispd_remote_server" use="legacy"/>"

if [[ "$var_audispd_remote_server" = "myhost.mydomain.com" ]] ; then
    echo "Refusing to set the audispd remote server to the unusable default value. Please configure the 'var_audispd_remote_server' variable before continuing." &gt;&amp;2
    exit 1
fi


AUDITCONFIG=/etc/audisp/audisp-remote.conf
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDITCONFIG '^remote_server' "$var_audispd_remote_server" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_audispd_remote_server:var:1" value-id="xccdf_org.ssgproject.content_value_var_audispd_remote_server"/>
                <check-content-ref name="oval:ssg-auditd_audispd_configure_remote_server:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_configure_remote_server_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_disk_full_action" selected="false" severity="medium">
              <version>SLES-12-020110</version>
              <title xml:lang="en-US">Configure audispd's Plugin disk_full_action When Disk Is Full</title>
              <description xml:lang="en-US">Configure the action the operating system takes if the disk the audit records
are written to becomes full. Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audisp/audisp-remote.conf</html:code>.
Add or modify the following line, substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">disk_full_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code> to cause the system to switch to single user
mode for corrective action. Acceptable values also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined.</description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020110</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92005r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000342-GPOS-00133</reference>
              <rationale xml:lang="en-US">Taking appropriate action in case of a filled audit storage volume will
minimize the possibility of losing audit records.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_audispd_disk_full_action" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install audit-audispd-plugins || exit 1


AUDITCONFIG=/etc/audisp/audisp-remote.conf
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDITCONFIG '^disk_full_action' "single" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-auditd_audispd_disk_full_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_disk_full_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_encrypt_sent_records" selected="false" severity="medium">
              <version>SLES-12-020080</version>
              <title xml:lang="en-US">Encrypt Audit Records Sent With audispd Plugin</title>
              <description xml:lang="en-US">Configure the operating system to encrypt the transfer of off-loaded audit
records onto a different system or media from the system being audited.

Uncomment the <html:code xmlns:html="http://www.w3.org/1999/xhtml">enable_krb5</html:code> option in <html:pre xmlns:html="http://www.w3.org/1999/xhtml">/etc/audisp/audisp-remote.conf</html:pre>,
and set it with the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">enable_krb5 = yes</html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020080</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91999r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000342-GPOS-00133</reference>
              <rationale xml:lang="en-US">Information stored in one location is vulnerable to accidental or incidental deletion
or alteration. Off-loading is a common process in information systems with limited
audit storage capacity.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_audispd_encrypt_sent_records" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install audit-audispd-plugins || exit 1



AUDISP_REMOTE_CONFIG="/etc/audisp/audisp-remote.conf"
option="^enable_krb5"
value="yes"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDISP_REMOTE_CONFIG "$option" "$value" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-auditd_audispd_encrypt_sent_records:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_encrypt_sent_records_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_network_failure_action" selected="false" severity="medium">
              <version>SLES-12-020100</version>
              <title xml:lang="en-US">Configure audispd's Plugin network_failure_action On Network Failure</title>
              <description xml:lang="en-US">Configure the action the operating system takes if there is an error sending
audit records to a remote system. Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audisp/audisp-remote.conf</html:code>.
Add or modify the following line, substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">network_failure_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code> to cause the system to switch to single user
mode for corrective action. Acceptable values also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined.</description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020100</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92003r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000342-GPOS-00133</reference>
              <rationale xml:lang="en-US">Taking appropriate action when there is an error sending audit records to a
remote system will minimize the possibility of losing audit records.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_audispd_network_failure_action" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install audit-audispd-plugins || exit 1
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/audisp/audisp-remote.conf' '^network_failure_action' syslog
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-auditd_audispd_network_failure_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_network_failure_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd to use audispd's syslog plugin</title>
              <description xml:lang="en-US">To configure the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service to use the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code> plug-in of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">audispd</html:code> audit event multiplexor, set
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">active</html:code> line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audisp/plugins.d/syslog.conf</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">yes</html:code>.
Restart the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo service auditd restart</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000136</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(B)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(6)(ii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(8)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(a)(2)(i)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(a)(2)(iii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.3</reference>
              <reference href="">SRG-OS-000051-VMM-000230</reference>
              <reference href="">SRG-OS-000058-VMM-000270</reference>
              <reference href="">SRG-OS-000059-VMM-000280</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <rationale xml:lang="en-US">The auditd service does not include the ability to send audit
records to a centralized server for management directly. It does, however,
include a plug-in for audit event multiplexor (audispd) to pass audit records
to the local syslog server</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_audispd_syslog_plugin_activated" system="urn:xccdf:fix:script:sh">
var_syslog_active="yes"


AUDISP_SYSLOGCONFIG=/etc/audisp/plugins.d/syslog.conf
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDISP_SYSLOGCONFIG '^active' "$var_syslog_active" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_disk_error_action" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd Disk Error Action on Disk Error</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to take an action
when there is a disk error.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">disk_error_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code> to cause the system to switch to single-user
mode for corrective action. Acceptable values also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code>,
<html:code xmlns:html="http://www.w3.org/1999/xhtml">exec</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code>, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> are described in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd.conf</html:code> man page.</description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <rationale xml:lang="en-US">Taking appropriate action in case of disk errors will minimize the possibility of
losing audit records.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_disk_error_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_disk_error_action"/>
                <check-content-ref name="oval:ssg-auditd_data_disk_error_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_disk_error_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_disk_full_action" selected="false" severity="medium">
              <version>SLES-12-020060</version>
              <title xml:lang="en-US">Configure auditd Disk Full Action when Disk Space Is Full</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to take an action
when disk space is running low but prior to running out of space completely.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">disk_full_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code> to cause the system to switch to single-user
mode for corrective action. Acceptable values also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code>,

<html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code>, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> are described in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd.conf</html:code> man page.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020060</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91995r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <rationale xml:lang="en-US">Taking appropriate action in case of a filled audit storage volume will minimize
the possibility of losing audit records.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_data_disk_full_action" system="urn:xccdf:fix:script:sh">
var_auditd_disk_full_action="<sub idref="xccdf_org.ssgproject.content_value_var_auditd_disk_full_action" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append /etc/audit/auditd.conf '^disk_full_action' "$var_auditd_disk_full_action" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_disk_full_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_disk_full_action"/>
                <check-content-ref name="oval:ssg-auditd_data_disk_full_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_disk_full_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="false" severity="medium">
              <version>SLES-12-020040</version>
              <title xml:lang="en-US">Configure auditd mail_acct Action on Low Disk Space</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to send email to
a designated account in certain situations. Add or correct the following line
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code> to ensure that administrators are notified
via email for those situations:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">action_mail_acct = <sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy"/></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000139</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(a)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020040</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91991r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000139</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001855</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7.a</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000343-GPOS-00134</reference>
              <reference href="">SRG-OS-000046-VMM-000210</reference>
              <reference href="">SRG-OS-000343-VMM-001240</reference>
              <rationale xml:lang="en-US">Email sent to the root account is typically aliased to the
administrators of the system, who can take appropriate action.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_data_retention_action_mail_acct" system="urn:xccdf:fix:script:sh">
var_auditd_action_mail_acct="<sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy"/>"

AUDITCONFIG=/etc/audit/auditd.conf
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDITCONFIG '^action_mail_acct' "$var_auditd_action_mail_acct" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_action_mail_acct:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_action_mail_acct:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd admin_space_left Action on Low Disk Space</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to take an action
when disk space is running low but prior to running out of space completely.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">admin_space_left_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code> to cause the system to switch to single user
mode for corrective action. Acceptable values also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">suspend</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> are described in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd.conf</html:code> man page.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000140</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001343</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <rationale xml:lang="en-US">Administrators should be made aware of an inability to record
audit records. If a separate partition or logical volume of adequate size
is used, running low on space for audit records should never occur.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_admin_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd Max Log File Size</title>
              <description xml:lang="en-US">Determine the amount of audit data (in megabytes)
which should be retained in each log file. Edit the file
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following line, substituting
the correct value of <sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" use="legacy"/> for <html:i xmlns:html="http://www.w3.org/1999/xhtml">STOREMB</html:i>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">max_log_file = <html:i>STOREMB</html:i></html:pre>
Set the value to <html:code xmlns:html="http://www.w3.org/1999/xhtml">6</html:code> (MB) or higher for general-purpose systems.
Larger values, of course,
support retention of even more audit data.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.1.1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum
log file size and the number of logs retained.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_max_log_file:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_max_log_file:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd max_log_file_action Upon Reaching Maximum Log Size</title>
              <description xml:lang="en-US">The default action to take when the logs reach their maximum size
is to rotate the log files, discarding the oldest one. To configure the action taken
by <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code>, add or correct the line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">max_log_file_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> are described in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd.conf</html:code> man
page. These include:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>syslog</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>rotate</html:code></html:li><html:li><html:code>keep_logs</html:code></html:li></html:ul>
Set the <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>ACTION</html:i></html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">rotate</html:code> to ensure log rotation
occurs. This is the default. The setting is case-insensitive.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.1.3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <rationale xml:lang="en-US">Automatically rotating logs (by setting this to <html:code xmlns:html="http://www.w3.org/1999/xhtml">rotate</html:code>)
minimizes the chances of the system unexpectedly running out of disk space by
being overwhelmed with log data. However, for systems that must never discard
log data, or which use external processes to transfer it and reclaim space,
<html:code xmlns:html="http://www.w3.org/1999/xhtml">keep_logs</html:code> can be employed.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_max_log_file_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_max_log_file_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd Number of Logs Retained</title>
              <description xml:lang="en-US">Determine how many log files
<html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> should retain when it rotates logs.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following
line, substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">NUMLOGS</html:i> with the correct value of <sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy"/>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">num_logs = <html:i>NUMLOGS</html:i></html:pre>
Set the value to 5 for general-purpose systems.
Note that values less than 2 result in no log rotation.</description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum log
file size and the number of logs retained.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_data_retention_num_logs" system="urn:xccdf:fix:script:sh">
var_auditd_num_logs="<sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy"/>"

AUDITCONFIG=/etc/audit/auditd.conf
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append $AUDITCONFIG '^num_logs' "$var_auditd_num_logs" ""
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_num_logs:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_num_logs"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_num_logs:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left" selected="false" severity="medium">
              <version>SLES-12-020030</version>
              <title xml:lang="en-US">Configure auditd space_left on Low Disk Space</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to take an action
when disk space is running low but prior to running out of space completely.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">SIZE_in_MB</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">space_left = <html:i>SIZE_in_MB</html:i></html:pre>

Where <html:i xmlns:html="http://www.w3.org/1999/xhtml">SIZE_in_MB</html:i> is at least 25% of the capacity of partition storing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit</html:code>.</description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020030</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91989r1_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001855</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000343-GPOS-00134</reference>
              <reference href="">SRG-OS-000343-VMM-001240</reference>
              <rationale xml:lang="en-US">Notifying administrators of an impending disk space problem may allow them to
take corrective action prior to any disruption.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="auditd_data_retention_space_left" system="urn:xccdf:fix:script:sh">

divide_round_up() {
    dividend="$1"
    divisor="$2"

    # to round up instead of truncate the result, we add (divisor - 1) to the dividend
    echo $((($dividend + $divisor - 1) / $divisor))
}

partition_size=$(df -B1M --output=size /var/log/audit | awk 'NR==2 {print $1}')
# threshold is 1 quarter of the partition size
space_left=$(divide_round_up "$partition_size" 4)
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/audit/auditd.conf' '^space_left' "$space_left" ''
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_space_left:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_space_left"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_space_left:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_space_left_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="false" severity="medium">
              <title xml:lang="en-US">Configure auditd space_left Action on Low Disk Space</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd</html:code> service can be configured to take an action
when disk space <html:i xmlns:html="http://www.w3.org/1999/xhtml">starts</html:i> to run low.
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/audit/auditd.conf</html:code>. Modify the following line,
substituting <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> appropriately:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">space_left_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i xmlns:html="http://www.w3.org/1999/xhtml">ACTION</html:i> are described in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">auditd.conf</html:code> man page.
These include:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>syslog</html:code></html:li><html:li><html:code>email</html:code></html:li><html:li><html:code>exec</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>single</html:code></html:li><html:li><html:code>halt</html:code></html:li></html:ul>
Set this to <html:code xmlns:html="http://www.w3.org/1999/xhtml">email</html:code> (instead of the default,
which is <html:code xmlns:html="http://www.w3.org/1999/xhtml">suspend</html:code>) as it is more likely to get prompt attention. Acceptable values
also include <html:code xmlns:html="http://www.w3.org/1999/xhtml">suspend</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">single</html:code>, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">halt</html:code>.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.2.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.4.1.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI08.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS02.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.3.1</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001855</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">RS.AN-4</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000343-GPOS-00134</reference>
              <reference href="">SRG-OS-000343-VMM-001240</reference>
              <rationale xml:lang="en-US">Notifying administrators of an impending disk space problem may
allow them to take corrective action prior to any disruption.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_auditd_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action"/>
                <check-content-ref name="oval:ssg-auditd_data_retention_space_left_action:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_configure_sufficiently_large_partition" selected="false" severity="medium">
              <version>SLES-12-020020</version>
              <title xml:lang="en-US">Configure a Sufficiently Large Partition for Audit Logs</title>
              <description xml:lang="en-US">The SUSE operating system must allocate audit record storage capacity to
store at least one weeks worth of audit records when audit records are not
immediately sent to a central audit record storage facility.

The partition size needed to capture a week's worth of audit records is
based on the activity level of the system and the total storage capacity
available. In normal circumstances, 10.0 GB of storage space for audit
records will be sufficient.

Check the size of the partition that audit records are written to with the
following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># df -h /var/log/audit/
/dev/sda2 24G 10.4G 13.6G 43% /var/log/audit</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020020</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91987r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000342-GPOS-00133</reference>
              <reference href="">SRG-OS-000051-VMM-000230</reference>
              <reference href="">SRG-OS-000058-VMM-000270</reference>
              <reference href="">SRG-OS-000059-VMM-000280</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <reference href="">SRG-OS-000479-VMM-001990</reference>
              <rationale xml:lang="en-US">Information stored in one location is vulnerable to accidental or incidental
deletion or alteration.Off-loading is a common process in information systems
with limited audit storage capacity.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-auditd_audispd_configure_sufficiently_large_partition_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_bootloader-grub-legacy">
          <title xml:lang="en-US">Set Boot Loader Password</title>
          <description xml:lang="en-US">During the boot process, the boot loader is
responsible for starting the execution of the kernel and passing
options to it. The boot loader allows for the selection of
different kernels - possibly on different partitions or media.
The default Red Hat Enterprise Linux boot loader for x86 systems is called GRUB.
Options it can pass to the kernel include <html:i xmlns:html="http://www.w3.org/1999/xhtml">single-user mode</html:i>, which
provides root access without any authentication, and the ability to
disable SELinux. To prevent local users from modifying the boot
parameters and endangering security, protect the boot loader configuration
with a password and ensure its configuration file's permissions
are set properly.</description>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_bootloader-grub2">
          <title xml:lang="en-US">Set Boot Loader Password</title>
          <description xml:lang="en-US">During the boot process, the boot loader is
responsible for starting the execution of the kernel and passing
options to it. The boot loader allows for the selection of
different kernels - possibly on different partitions or media.
The default SUSE Linux Enterprise 12 boot loader for x86 systems is called GRUB2.
Options it can pass to the kernel include <html:i xmlns:html="http://www.w3.org/1999/xhtml">single-user mode</html:i>, which
provides root access without any authentication, and the ability to
disable SELinux. To prevent local users from modifying the boot
parameters and endangering security, protect the boot loader configuration
with a password and ensure its configuration file's permissions
are set properly.</description>
          <platform idref="cpe:/a:machine"/>
          <Rule id="xccdf_org.ssgproject.content_rule_grub2_enable_iommu_force" selected="false" severity="unknown">
            <title xml:lang="en-US">IOMMU configuration directive</title>
            <description xml:lang="en-US">On x86 architecture supporting VT-d, the IOMMU manages the access control policy between the hardware devices and some
    of the system critical units such as the memory.</description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R11)</reference>
            <rationale xml:lang="en-US">On x86 architectures, activating the I/OMMU prevents the system from arbritrary accesses potentially made by
    hardware devices.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-grub2_enable_iommu_force:def:1" href="ssg-sle12-oval.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_grub2_password" selected="false" severity="high">
            <version>SLES-12-010430</version>
            <title xml:lang="en-US">Set Boot Loader Password in grub2</title>
            <description xml:lang="en-US">The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To do so, select a superuser account name and password and modify the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/grub.d/01_users</html:code> configuration file with the new account name.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Since plaintext passwords are a security risk, generate a hash for the pasword
by running the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ grub2-mkpasswd-pbkdf2</html:pre>

When prompted, enter the password that was selected.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
NOTE: It is recommended not to use common administrator account names like root,
admin, or administrator for the grub2 superuser account.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Change the superuser to a different username (The default is 'root').
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sed -i s/root/bootuser/g /etc/grub.d/01_users</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To meet FISMA Moderate, the bootloader superuser account and password MUST
differ from the root account and password.
Once the superuser account and password have been added,
update the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">grub.cfg</html:code> file by running:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">grub2-mkconfig -o /boot/grub2/grub.cfg</html:pre>
NOTE: Do NOT manually add the superuser account and password to the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">grub.cfg</html:code> file as the grub2-mkconfig command overwrites this file.</description>
            <warning xml:lang="en-US" category="general">To prevent hard-coded passwords, automatic remediation of this control is not available. Remediation
must be automated as a component of machine provisioning, or followed manually as outlined above.</warning>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010430</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91839r3_rule</reference>
            <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.4.2</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.5</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000213</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(e)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000080-GPOS-00048</reference>
            <rationale xml:lang="en-US">Password protection on the boot loader configuration ensures
users with physical access cannot trivially alter
important bootloader settings. These include which kernel to use,
and whether to enter single-user mode.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-grub2_password:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-grub2_password_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_grub2_uefi_password" selected="false" severity="medium">
            <version>SLES-12-010440</version>
            <title xml:lang="en-US">Set the UEFI Boot Loader Password</title>
            <description xml:lang="en-US">The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To do so, select a superuser account name and password and and modify the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/grub.d/01_users</html:code> configuration file with the new account name.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Since plaintext passwords are a security risk, generate a hash for the pasword
by running the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ grub2-mkpasswd-pbkdf2</html:pre>

When prompted, enter the password that was selected.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
NOTE: It is recommended not to use common administrator account names like root,
admin, or administrator for the grub2 superuser account.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Change the superuser to a different username (The default is 'root').
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sed -i s/root/bootuser/g /etc/grub.d/01_users</html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To meet FISMA Moderate, the bootloader superuser account and password MUST
differ from the root account and password.
Once the superuser account and password have been added,
update the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">grub.cfg</html:code> file by running:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">grub2-mkconfig -o /boot/efi/EFI/sles/grub.cfg</html:pre>

NOTE: Do NOT manually add the superuser account and password to the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">grub.cfg</html:code> file as the grub2-mkconfig command overwrites this file.</description>
            <warning xml:lang="en-US" category="general">To prevent hard-coded passwords, automatic remediation of this control is not available. Remediation
must be automated as a component of machine provisioning, or followed manually as outlined above.</warning>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010440</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91841r3_rule</reference>
            <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.4.2</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.5</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000213</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(B)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(i)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(7)(ii)(A)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(1)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(i)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(ii)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(a)(2)(iii)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000080-GPOS-00048</reference>
            <rationale xml:lang="en-US">Password protection on the boot loader configuration ensures
users with physical access cannot trivially alter
important bootloader settings. These include which kernel to use,
and whether to enter single-user mode.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-grub2_uefi_password:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-grub2_uefi_password_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_entropy">
          <title xml:lang="en-US">Protect Random-Number Entropy Pool</title>
          <description xml:lang="en-US">The I/O operations of the Linux kernel block layer due to their inherently
unpredictable execution times have been traditionally considered as a reliable
source to contribute to random-number entropy pool of the Linux kernel. This
has changed with introduction of solid-state storage devices (SSDs) though.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="false" severity="medium">
            <title xml:lang="en-US">Ensure Solid State Drives Do Not Contribute To Random-Number Entropy Pool</title>
            <description xml:lang="en-US">For each solid-state drive on the system, run:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"> # echo 0 &gt; /sys/block/DRIVE/queue/add_random</html:pre></description>
            <rationale xml:lang="en-US">In contrast to traditional electromechanical magnetic disks, containing
spinning disks and / or movable read / write heads, the solid-state storage
devices (SSDs) do not contain moving / mechanical components. Therefore the
I/O operation completion times are much more predictable for them.</rationale>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_logging">
          <title xml:lang="en-US">Configure Syslog</title>
          <description xml:lang="en-US">The syslog service has been the default Unix logging mechanism for
many years. It has a number of downsides, including inconsistent log format,
lack of authentication for received messages, and lack of authentication,
encryption, or reliable transport for messages sent over a network. However,
due to its long history, syslog is a de facto standard which is supported by
almost all Unix applications.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
In SUSE Linux Enterprise 12, rsyslog has replaced ksyslogd as the
syslog daemon of choice, and it includes some additional security features
such as reliable, connection-oriented (i.e. TCP) transmission of logs, the
option to log to database formats, and the encryption of log data en route to
a central logging server.
This section discusses how to configure rsyslog for
best effect, and how to use tools provided with the system to maintain and
monitor logs.</description>
          <platform idref="cpe:/a:machine"/>
          <Rule id="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="false" severity="medium">
            <title xml:lang="en-US">Ensure rsyslog is Installed</title>
            <description xml:lang="en-US">Rsyslog is installed by default. The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> package can be installed with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml"> $ sudo zypper install rsyslog</html:pre></description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R46)</reference>
            <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001311</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001312</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <rationale xml:lang="en-US">The rsyslog package provides the rsyslog daemon, which provides
system logging services.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_rsyslog_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install rsyslog
</fix>
            <fix id="package_rsyslog_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure rsyslog is installed
  package:
    name: rsyslog
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_rsyslog_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-9(2)
</fix>
            <fix id="package_rsyslog_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_rsyslog

class install_rsyslog {
  package { 'rsyslog':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_rsyslog_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="false" severity="medium">
            <title xml:lang="en-US">Enable rsyslog Service</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> service provides syslog-style logging by default on SUSE Linux Enterprise 12.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable rsyslog.service</html:pre></description>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
            <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R46)</reference>
            <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.1.1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001311</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001312</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001557</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
            <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
            <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> service must be running in order to provide
logging services, which are essential to system administration.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_rsyslog_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'rsyslog' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'rsyslog.service'
"$SYSTEMCTL_EXEC" enable 'rsyslog.service'
</fix>
            <fix id="service_rsyslog_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service rsyslog
  service:
    name: rsyslog
    enabled: 'yes'
    state: started
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_rsyslog_enabled
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AU-4(1)
    - NIST-800-53-AU-12
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_rsyslog_enabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_ensure_rtc_utc_configuration" selected="false" severity="high">
            <version>SLES-12-030310</version>
            <title xml:lang="en-US">Ensure real-time clock is set to UTC</title>
            <description xml:lang="en-US">Ensure that the system real-time clock (RTC) is set to Coordinated Universal Time (UTC).</description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030310</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92173r1_rule</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001890</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000359-GPOS-00146</reference>
            <rationale xml:lang="en-US">If time stamps are not consistently applied and there is no common
time reference, it is difficult to perform forensic analysis.

Time stamps generated by the operating system include date and time.
Time is commonly expressed in UTC, a modern continuation of GMT, or
local time with an offset from UTC.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="ensure_rtc_utc_configuration" system="urn:xccdf:fix:script:sh">
LOCAL_TZ=`timedatectl status | grep -c "RTC in local TZ: yes"`

if [ $LOCAL_TZ -eq 1 ]; then
	timedatectl set-local-rtc 0 --adjust-system-clock
fi
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-ensure_rtc_utc_configuration:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-ensure_rtc_utc_configuration_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver">
            <title xml:lang="en-US">Configure Logwatch on the Central Log Server</title>
            <description xml:lang="en-US">Is this system the central log server? If so, edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logwatch/conf/logwatch.conf</html:code> as shown below.</description>
            <platform idref="cpe:/a:machine"/>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
            <title xml:lang="en-US">Ensure Proper Configuration of Log Files</title>
            <description xml:lang="en-US">The file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> controls where log message are written.
These are controlled by lines called <html:i xmlns:html="http://www.w3.org/1999/xhtml">rules</html:i>, which consist of a
<html:i xmlns:html="http://www.w3.org/1999/xhtml">selector</html:i> and an <html:i xmlns:html="http://www.w3.org/1999/xhtml">action</html:i>.
These rules are often customized depending on the role of the system, the
requirements of the environment, and whatever may enable
the administrator to most effectively make use of log data.
The default rules in SUSE Linux Enterprise 12 are:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">*.info;mail.none;authpriv.none;cron.none                /var/log/messages
authpriv.*                                              /var/log/secure
mail.*                                                  -/var/log/maillog
cron.*                                                  /var/log/cron
*.emerg                                                 *
uucp,news.crit                                          /var/log/spooler
local7.*                                                /var/log/boot.log</html:pre>
See the man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog.conf(5)</html:code> for more information.
<html:i xmlns:html="http://www.w3.org/1999/xhtml">Note that the <html:code>rsyslog</html:code> daemon can be configured to use a timestamp format that
some log processing programs may not understand. If this occurs,
edit the file <html:code>/etc/rsyslog.conf</html:code> and add or edit the following line:</html:i>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat</html:pre></description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" type="string">
              <title xml:lang="en-US">group who owns log files</title>
              <description xml:lang="en-US">Specify group owner of all logfiles specified in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf.</html:code></description>
              <value>root</value>
              <value selector="adm">adm</value>
              <value selector="root">root</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" type="string">
              <title xml:lang="en-US">User who owns log files</title>
              <description xml:lang="en-US">Specify user owner of all logfiles specified in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code>.</description>
              <value>root</value>
              <value selector="adm">adm</value>
              <value selector="root">root</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate Group</title>
              <description xml:lang="en-US">The group-owner of all log files written by
<html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> should be <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" use="legacy"/></html:code>.
These log files are determined by the second part of each Rule line in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> and typically all appear in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log</html:code>.
For each log file <html:i xmlns:html="http://www.w3.org/1999/xhtml">LOGFILE</html:i> referenced in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's group owner:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" use="legacy"/></html:code>, run the following command to
correct this:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo chgrp <sub idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" use="legacy"/> <html:i>LOGFILE</html:i></html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001314</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.2</reference>
              <rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate User</title>
              <description xml:lang="en-US">The owner of all log files written by
<html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> should be <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" use="legacy"/></html:code>.
These log files are determined by the second part of each Rule line in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> and typically all appear in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log</html:code>.
For each log file <html:i xmlns:html="http://www.w3.org/1999/xhtml">LOGFILE</html:i> referenced in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's owner:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" use="legacy"/></html:code>, run the following command to
correct this:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo chown <sub idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" use="legacy"/> <html:i>LOGFILE</html:i></html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001314</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.2</reference>
              <rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure System Log Files Have Correct Permissions</title>
              <description xml:lang="en-US">The file permissions for all log files written by <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> should
be set to 600, or more restrictive. These log files are determined by the
second part of each Rule line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> and typically
all appear in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log</html:code>. For each log file <html:i xmlns:html="http://www.w3.org/1999/xhtml">LOGFILE</html:i>
referenced in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code>, run the following command to
inspect the file's permissions:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the permissions are not 600 or more restrictive, run the following
command to correct this:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0600 <html:i>LOGFILE</html:i></html:pre>"</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.1.3</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001314</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.5.2</reference>
              <rationale xml:lang="en-US">Log files can contain valuable information regarding system
configuration. If the system log files are not protected unauthorized
users could change the logged data, eliminating their forensic value.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_log_rotation">
            <title xml:lang="en-US">Ensure All Logs are Rotated by logrotate</title>
            <description xml:lang="en-US">
Edit the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logrotate.d/syslog</html:code>. Find the first

line, which should look like this (wrapped for clarity):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/var/log/messages /var/log/secure /var/log/maillog /var/log/spooler \
  /var/log/boot.log /var/log/cron {</html:pre>
Edit this line so that it contains a one-space-separated
listing of each log file referenced in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
All logs in use on a system must be rotated regularly, or the
log files will consume disk space over time, eventually interfering
with system operation. The file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logrotate.d/syslog</html:code> is the
configuration file used by the <html:code xmlns:html="http://www.w3.org/1999/xhtml">logrotate</html:code> program to maintain all
log files written by <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog</html:code>. By default, it rotates logs weekly and
stores four archival copies of each log. These settings can be
modified by editing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logrotate.conf</html:code>, but the defaults are
sufficient for purposes of this guide.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Note that <html:code xmlns:html="http://www.w3.org/1999/xhtml">logrotate</html:code> is run nightly by the cron job
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/cron.daily/logrotate</html:code>. If particularly active logs need to be
rotated more often than once a day, some other mechanism must be
used.</description>
            <platform idref="cpe:/a:machine"/>
            <Rule id="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure Logrotate Runs Periodically</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">logrotate</html:code> utility allows for the automatic rotation of
log files.  The frequency of rotation is specified in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logrotate.conf</html:code>,
which triggers a cron task.  To configure logrotate to run daily, add or correct
the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/logrotate.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># rotate log files <html:i>frequency</html:i>
daily</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-10.7</reference>
              <rationale xml:lang="en-US">Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="ensure_logrotate_activated" system="urn:xccdf:fix:script:sh">
LOGROTATE_CONF_FILE="/etc/logrotate.conf"
CRON_DAILY_LOGROTATE_FILE="/etc/cron.daily/logrotate"

# daily rotation is configured
grep -q "^daily$" $LOGROTATE_CONF_FILE|| echo "daily" &gt;&gt; $LOGROTATE_CONF_FILE

# remove any line configuring weekly, monthly or yearly rotation
sed -i -r "/^(weekly|monthly|yearly)$/d" $LOGROTATE_CONF_FILE

# configure cron.daily if not already
if ! grep -q "^[[:space:]]*/usr/sbin/logrotate[[:alnum:][:blank:][:punct:]]*$LOGROTATE_CONF_FILE$" $CRON_DAILY_LOGROTATE_FILE; then
	echo "#!/bin/sh" &gt; $CRON_DAILY_LOGROTATE_FILE
	echo "/usr/sbin/logrotate $LOGROTATE_CONF_FILE" &gt;&gt; $CRON_DAILY_LOGROTATE_FILE
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-ensure_logrotate_activated:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
            <title xml:lang="en-US">Configure rsyslogd to Accept Remote Messages If Acting as a Log Server</title>
            <description xml:lang="en-US">By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> does not listen over the network
for log messages. If needed, modules can be enabled to allow
the rsyslog daemon to receive messages from other systems and for the system
thus to act as a log server.
If the system is not a log server, then lines concerning these modules
should remain commented out.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
            <platform idref="cpe:/a:machine"/>
            <Rule id="xccdf_org.ssgproject.content_rule_package_syslogng_installed" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure syslog-ng is Installed</title>
              <description xml:lang="en-US">syslog-ng can be installed in replacement of rsyslog.
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog-ng-core</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install syslog-ng-core</html:pre></description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R46)</reference>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.1.1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001311</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001312</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <rationale xml:lang="en-US">The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-package_syslogng_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_tcp" selected="false" severity="unknown">
              <title xml:lang="en-US">Enable rsyslog to Accept Messages via TCP, if Acting As Log Server</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> to enable reception of messages over TCP:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ModLoad imtcp
$InputTCPServerRun 514</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.1.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <rationale xml:lang="en-US">If the system needs to act as a log server, this ensures that it can receive
messages over a reliable TCP connection.</rationale>
              <platform idref="cpe:/a:machine"/>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="unknown">
              <title xml:lang="en-US">Enable rsyslog to Accept Messages via UDP, if Acting As Log Server</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> to enable reception of messages over UDP:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ModLoad imudp
$UDPServerRun 514</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.1.5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <rationale xml:lang="en-US">Many devices, such as switches, routers, and other Unix-like systems, may only support
the traditional syslog transmission over UDP. If the system must act as a log server,
this enables it to receive their messages as well.</rationale>
              <platform idref="cpe:/a:machine"/>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_service_syslogng_enabled" selected="false" severity="medium">
              <title xml:lang="en-US">Enable syslog-ng Service</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog-ng</html:code> service (in replacement of rsyslog) provides syslog-style logging by default on Debian 8.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog-ng</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable syslog-ng.service</html:pre></description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R46)</reference>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">5.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA01.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.2.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.15.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.SC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">syslog-ng</html:code> service must be running in order to provide
logging services, which are essential to system administration.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-service_syslogng_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
            <title xml:lang="en-US">Rsyslog Logs Sent To Remote Host</title>
            <description xml:lang="en-US">If system logs are to be useful in detecting malicious
activities, it is necessary to send logs to a remote server. An
intruder who has compromised the root account on a system may
delete the log entries which indicate that the system was attacked
before they are seen by an administrator.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
However, it is recommended that logs be stored on the local
host in addition to being sent to the loghost, especially if
<html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> has been configured to use the UDP protocol to send
messages over a network. UDP does not guarantee reliable delivery,
and moderately busy sites will lose log messages occasionally,
especially in periods of high traffic which may be the result of an
attack. In addition, remote <html:code xmlns:html="http://www.w3.org/1999/xhtml">rsyslog</html:code> messages are not
authenticated in any way by default, so it is easy for an attacker to
introduce spurious messages to the central log server. Also, some
problems cause loss of network connectivity, which will prevent the
sending of messages to the central server. For all of these reasons, it is
better to store log messages both centrally and on each host, so
that they can be correlated if necessary.</description>
            <platform idref="cpe:/a:machine"/>
            <Value id="xccdf_org.ssgproject.content_value_rsyslog_remote_loghost_address" type="string" interactive="true">
              <title xml:lang="en-US">Remote Log Server</title>
              <description xml:lang="en-US">Specify an URI or IP address of a remote host where the log messages will be sent and stored.</description>
              <value>logcollector</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="medium">
              <version>SLES-12-030340</version>
              <title xml:lang="en-US">Ensure Logs Sent To Remote Host</title>
              <description xml:lang="en-US">To configure rsyslog to send logs to a remote log server,
open <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/rsyslog.conf</html:code> and read and understand the last section of the file,
which describes the multiple directives necessary to activate remote
logging.
Along with these other directives, the system can be configured
to forward its logs to a particular log server by
adding or correcting one of the following lines,
substituting <html:code xmlns:html="http://www.w3.org/1999/xhtml"><html:i>loghost.example.com</html:i></html:code> appropriately.
The choice of protocol depends on the environment of the system;
although TCP and RELP provide more reliable message delivery,
they may not be supported in all environments.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To use UDP for log message delivery:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">*.* @<html:i>loghost.example.com</html:i></html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To use TCP for log message delivery:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">*.* @@<html:i>loghost.example.com</html:i></html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To use RELP for log message delivery:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">*.* :omrelp:<html:i>loghost.example.com</html:i></html:pre>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
There must be a resolvable DNS CNAME or Alias record set to "<sub idref="xccdf_org.ssgproject.content_value_rsyslog_remote_loghost_address" use="legacy"/>" for logs to be sent correctly to the centralized logging utility.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000479-GPOS-00224</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030340</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92179r1_rule</reference>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R7)</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.2.1.4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001348</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000136</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001851</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(B)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(5)(ii)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(6)(ii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(8)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)(iii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(a)(2)(i)(C)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(a)(2)(iii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4(1)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000032-VMM-000130</reference>
              <rationale xml:lang="en-US">A log server (loghost) receives syslog messages from one or more
systems. This data can be used as an additional log source in the event a
system is compromised and its local logs are suspect. Forwarding log messages
to a remote loghost also provides system administrators with a centralized
place to view the status of multiple hosts within the enterprise.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="rsyslog_remote_loghost" system="urn:xccdf:fix:script:sh">
rsyslog_remote_loghost_address="<sub idref="xccdf_org.ssgproject.content_value_rsyslog_remote_loghost_address" use="legacy"/>"

if [[ "$rsyslog_remote_loghost_address" = "logcollector" ]] ; then
    echo 'Refusing to configure the set the remote host to the default value. Please set rsyslog_remote_loghost_address to a sensible value before continuing.' &gt;&amp;2
    exit 1
fi
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/rsyslog.conf' '^\*\.\*' "@@$rsyslog_remote_loghost_address" '' '%s %s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-rsyslog_remote_loghost:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_network">
          <title xml:lang="en-US">Network Configuration and Firewalls</title>
          <description xml:lang="en-US">Most systems must be connected to a network of some
sort, and this brings with it the substantial risk of network
attack. This section discusses the security impact of decisions
about networking which must be made when configuring a system.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This section also discusses firewalls, network access
controls, and other network security frameworks, which allow
system-level rules to be written that can limit an attackers' ability
to connect to your system. These rules can specify that network
traffic should be allowed or denied from certain IP addresses,
hosts, and networks. The rules can also specify which of the
system's network services are available to particular hosts or
networks.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="false" severity="medium">
            <version>SLES-12-030440</version>
            <title xml:lang="en-US">Ensure System is Not Acting as a Network Sniffer</title>
            <description xml:lang="en-US">The system should not be acting as a network sniffer, which can
capture all traffic on the network to which it is connected. Run the following
to determine if any interface is running in promiscuous mode:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ ip link | grep PROMISC</html:pre></description>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030440</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92199r2_rule</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
            <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.06</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.10</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI09.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI09.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI09.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
            <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
            <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.8</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.5</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.16.1.6</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.1.1</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.8.1.2</reference>
            <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7(2).1(i)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-3</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.DP-5</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.MA-1</reference>
            <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
            <rationale xml:lang="en-US">Network interfaces in promiscuous mode allow for the capture of all network traffic
visible to the system. If unauthorized individuals can access these applications, it
may allow them to collect information such as logon IDs, passwords, and key exchanges
between systems.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system is being used to perform a network troubleshooting function, the use of these
tools must be documented with the Information Systems Security Manager (ISSM) and restricted
to only authorized personnel.</rationale>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-network_sniffer_disabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-network_sniffer_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Group id="xccdf_org.ssgproject.content_group_network-firewalld">
            <title xml:lang="en-US">firewalld</title>
            <description xml:lang="en-US">The dynamic firewall daemon <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewalld</html:code> provides a
dynamically managed firewall with support for network “zones” to assign
a level of trust to a network and its associated connections and interfaces.
It has support for IPv4 and IPv6 firewall settings. It supports Ethernet
bridges and has a separation of runtime and permanent configuration options.
It also has an interface for services or applications to add firewall rules
directly.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
A graphical configuration tool, <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewall-config</html:code>, is used to configure
<html:code xmlns:html="http://www.w3.org/1999/xhtml">firewalld</html:code>, which in turn uses <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> tool to communicate
with <html:code xmlns:html="http://www.w3.org/1999/xhtml">Netfilter</html:code> in the kernel which implements packet filtering.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The firewall service provided by <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewalld</html:code> is dynamic rather than
static because changes to the configuration can be made at anytime and are
immediately implemented. There is no need to save or apply the changes. No
unintended disruption of existing network connections occurs as no part of
the firewall has to be reloaded.</description>
            <platform idref="cpe:/a:machine"/>
            <Group id="xccdf_org.ssgproject.content_group_firewalld_activation">
              <title xml:lang="en-US">Inspect and Activate Default firewalld Rules</title>
              <description xml:lang="en-US">Firewalls can be used to separate networks into different zones
based on the level of trust the user has decided to place on the devices and
traffic within that network. <html:code xmlns:html="http://www.w3.org/1999/xhtml">NetworkManager</html:code> informs firewalld to which
zone an interface belongs. An interface's assigned zone can be changed by
<html:code xmlns:html="http://www.w3.org/1999/xhtml">NetworkManager</html:code> or via the <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewall-config</html:code> tool.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The zone settings in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/firewalld/</html:code> are a range of preset settings
which can be quickly applied to a network interface. These are the zones
provided by firewalld sorted according to the default trust level of the
zones from untrusted to trusted:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li><html:code>drop</html:code><html:br/><html:p>Any incoming network packets are dropped, there is no
reply. Only outgoing network connections are possible.</html:p></html:li><html:li><html:code>block</html:code><html:br/><html:p>Any incoming network connections are rejected with an
<html:code>icmp-host-prohibited</html:code> message for IPv4 and <html:code>icmp6-adm-prohibited</html:code>
for IPv6. Only network connections initiated from within the system are
possible.</html:p></html:li><html:li><html:code>public</html:code><html:br/><html:p>For use in public areas. You do not trust the other
computers on the network to not harm your computer. Only selected incoming
connections are accepted.</html:p></html:li><html:li><html:code>external</html:code><html:br/><html:p>For use on external networks with masquerading enabled
especially for routers. You do not trust the other computers on the network to
not harm your computer. Only selected incoming connections are accepted.</html:p></html:li><html:li><html:code>dmz</html:code><html:br/><html:p>For computers in your demilitarized zone that are
publicly-accessible with limited access to your internal network. Only selected
incoming connections are accepted.</html:p></html:li><html:li><html:code>work</html:code><html:br/><html:p>For use in work areas. You mostly trust the other computers
on networks to not harm your computer. Only selected incoming connections are
accepted.</html:p></html:li><html:li><html:code>home</html:code><html:br/><html:p>For use in home areas. You mostly trust the other computers
on networks to not harm your computer. Only selected incoming connections are
accepted.</html:p></html:li><html:li><html:code>internal</html:code><html:br/><html:p>For use on internal networks. You mostly trust the
other computers on the networks to not harm your computer. Only selected
incoming connections are accepted.</html:p></html:li><html:li><html:code>trusted</html:code><html:br/><html:p>All network connections are accepted.</html:p></html:li></html:ul>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
It is possible to designate one of these zones to be the default zone. When
interface connections are added to <html:code xmlns:html="http://www.w3.org/1999/xhtml">NetworkManager</html:code>, they are assigned
to the default zone. On installation, the default zone in firewalld is set to
be the public zone.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To find out all the settings of a zone, for example the <html:code xmlns:html="http://www.w3.org/1999/xhtml">public zone,</html:code>
enter the following command as root:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># firewall-cmd --zone=public --list-all</html:pre>
Example output of this command might look like the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
# firewall-cmd --zone=public --list-all
public
  interfaces:
  services: mdns dhcpv6-client ssh
  ports:
  forward-ports:
  icmp-blocks: source-quench
</html:pre>
To view the network zones currently active, enter the following command as root:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># firewall-cmd --get-service</html:pre>
The following listing displays the result of this command
on common SUSE Linux Enterprise 12 system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
# firewall-cmd --get-service
amanda-client bacula bacula-client dhcp dhcpv6 dhcpv6-client dns ftp
high-availability http https imaps ipp ipp-client ipsec kerberos kpasswd
ldap ldaps libvirt libvirt-tls mdns mountd ms-wbt mysql nfs ntp openvpn
pmcd pmproxy pmwebapi pmwebapis pop3s postgresql proxy-dhcp radius rpc-bind
samba samba-client smtp ssh telnet tftp tftp-client transmission-client
vnc-server wbem-https
</html:pre>
Finally to view the network zones that will be active after the next firewalld
service reload, enter the following command as root:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># firewall-cmd --get-service --permanent</html:pre></description>
              <platform idref="cpe:/a:machine"/>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_ruleset_modifications">
              <title xml:lang="en-US">Strengthen the Default Ruleset</title>
              <description xml:lang="en-US">The default rules can be strengthened. The system
scripts that activate the firewall rules expect them to be defined
in configuration files under the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/firewalld/services</html:code>
and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/firewalld/zones</html:code> directories.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The following recommendations describe how to strengthen the
default ruleset configuration file. An alternative to editing this
configuration file is to create a shell script that makes calls to
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewall-cmd</html:code> program to load in rules under the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/firewalld/services</html:code>
and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/firewalld/zones</html:code> directories.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Instructions apply to both unless otherwise noted. Language and address
conventions for regular firewalld rules are used throughout this section.</description>
              <warning xml:lang="en-US" category="general">The program <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewall-config</html:code>
allows additional services to penetrate the default firewall rules
and automatically adjusts the <html:code xmlns:html="http://www.w3.org/1999/xhtml">firewalld</html:code> ruleset(s).</warning>
              <platform idref="cpe:/a:machine"/>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-ipsec">
            <title xml:lang="en-US">IPSec Support</title>
            <description xml:lang="en-US">Support for Internet Protocol Security (IPsec)</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-iptables">
            <title xml:lang="en-US">iptables and ip6tables</title>
            <description xml:lang="en-US">A host-based firewall called <html:code xmlns:html="http://www.w3.org/1999/xhtml">netfilter</html:code> is included as
part of the Linux kernel distributed with the system. It is
activated by default. This firewall is controlled by the program
<html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code>, and the entire capability is frequently referred to by
this name. An analogous program called <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> handles filtering
for IPv6.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Unlike TCP Wrappers, which depends on the network server
program to support and respect the rules written, <html:code xmlns:html="http://www.w3.org/1999/xhtml">netfilter</html:code>
filtering occurs at the kernel level, before a program can even
process the data from the network packet. As such, any program on
the system is affected by the rules written.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This section provides basic information about strengthening
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> configurations included with the system.
For more complete information that may allow the construction of a
sophisticated ruleset tailored to your environment, please consult
the references at the end of this section.</description>
            <Group id="xccdf_org.ssgproject.content_group_iptables_activation">
              <title xml:lang="en-US">Inspect and Activate Default Rules</title>
              <description xml:lang="en-US">View the currently-enforced <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> rules by running
the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo iptables -nL --line-numbers</html:pre>
The command is analogous for <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the firewall does not appear to be active (i.e., no rules
appear), activate it and ensure that it starts at boot by issuing
the following commands (and analogously for <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code>):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo service iptables restart</html:pre>
The default iptables rules are:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">Chain INPUT (policy ACCEPT)
num  target     prot opt source       destination
1    ACCEPT     all  --  0.0.0.0/0    0.0.0.0/0    state RELATED,ESTABLISHED 
2    ACCEPT     icmp --  0.0.0.0/0    0.0.0.0/0
3    ACCEPT     all  --  0.0.0.0/0    0.0.0.0/0
4    ACCEPT     tcp  --  0.0.0.0/0    0.0.0.0/0    state NEW tcp dpt:22 
5    REJECT     all  --  0.0.0.0/0    0.0.0.0/0    reject-with icmp-host-prohibited 

Chain FORWARD (policy ACCEPT)
num  target     prot opt source       destination
1    REJECT     all  --  0.0.0.0/0    0.0.0.0/0    reject-with icmp-host-prohibited 

Chain OUTPUT (policy ACCEPT)
num  target     prot opt source       destination</html:pre>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> default rules are essentially the same.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="false" severity="medium">
                <title xml:lang="en-US">Verify ip6tables Enabled if Using IPv6</title>
                <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable ip6tables.service</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> service provides the system's host-based firewalling
capability for IPv6 and ICMPv6.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="false" severity="medium">
                <title xml:lang="en-US">Verify iptables Enabled</title>
                <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable iptables.service</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> service provides the system's host-based firewalling
capability for IPv4 and ICMP.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="false" severity="medium">
                <title xml:lang="en-US">Set Default ip6tables Policy for Incoming Packets</title>
                <description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">:INPUT DROP [0:0]</html:pre>
If changes were required, reload the ip6tables rules:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo service ip6tables reload</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code xmlns:html="http://www.w3.org/1999/xhtml">DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_iptables_ruleset_modifications">
              <title xml:lang="en-US">Strengthen the Default Ruleset</title>
              <description xml:lang="en-US">The default rules can be strengthened. The system
scripts that activate the firewall rules expect them to be defined
in the configuration files <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">ip6tables</html:code> in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig</html:code>. Many of the lines in these files are similar
to the command line arguments that would be provided to the programs
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/sbin/iptables</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">/sbin/ip6tables</html:code> - but some are quite
different.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The following recommendations describe how to strengthen the
default ruleset configuration file. An alternative to editing this
configuration file is to create a shell script that makes calls to
the iptables program to load in rules, and then invokes service
iptables save to write those loaded rules to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables.</html:code>
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The following alterations can be made directly to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code>.
Instructions apply to both unless otherwise noted. Language and address
conventions for regular iptables are used throughout this section;
configuration for ip6tables will be either analogous or explicitly
covered.</description>
              <warning xml:lang="en-US" category="general">The program <html:code xmlns:html="http://www.w3.org/1999/xhtml">system-config-securitylevel</html:code>
allows additional services to penetrate the default firewall rules
and automatically adjusts <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code>. This program
is only useful if the default ruleset meets your security
requirements. Otherwise, this program should not be used to make
changes to the firewall configuration because it re-writes the
saved configuration file.</warning>
              <Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="false" severity="medium">
                <title xml:lang="en-US">Set Default iptables Policy for Incoming Packets</title>
                <description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">:INPUT DROP [0:0]</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code> the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code xmlns:html="http://www.w3.org/1999/xhtml">DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="false" severity="medium">
                <title xml:lang="en-US">Set Default iptables Policy for Forwarded Packets</title>
                <description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in FORWARD chain which processes packets that will be forwarded from
one interface to another,
add or correct the following line in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">:FORWARD DROP [0:0]</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">iptables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code xmlns:html="http://www.w3.org/1999/xhtml">DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Group id="xccdf_org.ssgproject.content_group_iptables_icmp_disabled">
                <title xml:lang="en-US">Restrict ICMP Message Types</title>
                <description xml:lang="en-US">In <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code>, the accepted ICMP messages
types can be restricted. To accept only ICMP echo reply, destination
unreachable, and time exceeded messages, remove the line:<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -p icmp --icmp-type any -j ACCEPT</html:pre>
and insert the lines:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
-A INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT
-A INPUT -p icmp --icmp-type time-exceeded -j ACCEPT</html:pre>
To allow the system to respond to pings, also insert the following line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -p icmp --icmp-type echo-request -j ACCEPT</html:pre>
Ping responses can also be limited to certain networks or hosts by using the -s
option in the previous rule.  Because IPv6 depends so heavily on ICMPv6, it is
preferable to deny the ICMPv6 packets you know you don't need (e.g. ping
requests) in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code>, while letting everything else
through:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -p icmpv6 --icmpv6-type echo-request -j DROP</html:pre>
If you are going to statically configure the system's address, it should
ignore Router Advertisements which could add another IPv6 address to the
interface or alter important network settings:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -p icmpv6 --icmpv6-type router-advertisement -j DROP</html:pre>
Restricting ICMPv6 message types in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/ip6tables</html:code> is not
recommended because the operation of IPv6 depends heavily on ICMPv6. Thus, great
care must be taken if any other ICMPv6 types are blocked.</description>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious">
                <title xml:lang="en-US">Log and Drop Packets with Suspicious Source Addresses</title>
                <description xml:lang="en-US">Packets with non-routable source addresses should be rejected, as they may indicate spoofing. Because the
modified policy will reject non-matching packets, you only need to add these rules if you are interested in also
logging these spoofing or suspicious attempts before they are dropped. If you do choose to log various suspicious
traffic, add identical rules with a target of <html:code xmlns:html="http://www.w3.org/1999/xhtml">DROP</html:code> after each <html:i xmlns:html="http://www.w3.org/1999/xhtml">LOG</html:i>.
To log and then drop these IPv4 packets, insert the following rules in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/iptables</html:code> (excepting
any that are intentionally used):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -s 10.0.0.0/8 -j LOG --log-prefix "IP DROP SPOOF A: "
-A INPUT -s 172.16.0.0/12 -j LOG --log-prefix "IP DROP SPOOF B: "
-A INPUT -s 192.168.0.0/16 -j LOG --log-prefix "IP DROP SPOOF C: "
-A INPUT -s 224.0.0.0/4 -j LOG --log-prefix "IP DROP MULTICAST D: "
-A INPUT -s 240.0.0.0/5 -j LOG --log-prefix "IP DROP SPOOF E: "
-A INPUT -d 127.0.0.0/8 -j LOG --log-prefix "IP DROP LOOPBACK: "</html:pre>
Similarly, you might wish to log packets containing some IPv6 reserved addresses if they are not expected
on your network:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -i eth0 -s ::1 -j LOG --log-prefix "IPv6 DROP LOOPBACK: "
-A INPUT -s 2002:E000::/20 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:7F00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:0000::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:FF00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:0A00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:AC10::/28 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:C0A8::/32 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "</html:pre>
If you are not expecting to see site-local multicast or auto-tunneled traffic, you can log those:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -s FF05::/16 -j LOG --log-prefix "IPv6 SITE-LOCAL MULTICAST: "
-A INPUT -s ::0.0.0.0/96 -j LOG --log-prefix "IPv4 COMPATIBLE IPv6 ADDR: "</html:pre>
If you wish to block multicasts to all link-local nodes (e.g. if you are not using router auto-configuration and
do not plan to have any services that multicast to the entire local network), you can block the link-local
all-nodes multicast address (before accepting incoming ICMPv6):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -d FF02::1 -j LOG --log-prefix "Link-local All-Nodes Multicast: "</html:pre>
However, if you're going to allow IPv4 compatible IPv6 addresses (of the form ::0.0.0.0/96), you should
then consider logging the non-routable IPv4-compatible addresses:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -s ::0.0.0.0/104 -j LOG --log-prefix "IP NON-ROUTABLE ADDR: "
-A INPUT -s ::127.0.0.0/104 -j LOG --log-prefix "IP DROP LOOPBACK: "
-A INPUT -s ::224.0.0.0.0/100 -j LOG --log-prefix "IP DROP MULTICAST D: "
-A INPUT -s ::255.0.0.0/104 -j LOG --log-prefix "IP BROADCAST: "</html:pre>
If you are not expecting to see any IPv4 (or IPv4-compatible) traffic on your network, consider logging it before it gets dropped:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -s ::FFFF:0.0.0.0/96 -j LOG --log-prefix "IPv4 MAPPED IPv6 ADDR: "
-A INPUT -s 2002::/16 -j LOG --log-prefix "IPv6 6to4 ADDR: "</html:pre>
The following rule will log all traffic originating from a site-local address, which is deprecated address space:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">-A INPUT -s FEC0::/10 -j LOG --log-prefix "SITE-LOCAL ADDRESS TRAFFIC: "</html:pre></description>
              </Group>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-ipv6">
            <title xml:lang="en-US">IPv6</title>
            <description xml:lang="en-US">The system includes support for Internet Protocol
version 6. A major and often-mentioned improvement over IPv4 is its
enormous increase in the number of available addresses. Another
important feature is its support for automatic configuration of
many network settings.</description>
            <Group id="xccdf_org.ssgproject.content_group_configuring_ipv6">
              <title xml:lang="en-US">Configure IPv6 Settings if Necessary</title>
              <description xml:lang="en-US">A major feature of IPv6 is the extent to which systems
implementing it can automatically configure their networking
devices using information from the network. From a security
perspective, manually configuring important configuration
information is preferable to accepting it from the network
in an unauthenticated fashion.</description>
              <Group id="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig">
                <title xml:lang="en-US">Disable Automatic Configuration</title>
                <description xml:lang="en-US">Disable the system's acceptance of router
advertisements and redirects by adding or correcting the following
line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/network</html:code> (note that this does not disable
sending router solicitations):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">IPV6_AUTOCONF=no</html:pre></description>
                <Value id="xccdf_org.ssgproject.content_value_sysconfig_network_IPV6_AUTOCONF_value" type="string">
                  <title xml:lang="en-US">IPV6_AUTOCONF</title>
                  <description xml:lang="en-US">Toggle global IPv6 auto-configuration (only, if global
forwarding is disabled)</description>
                  <value>no</value>
                  <value selector="disabled">no</value>
                  <value selector="enabled">yes</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_ra_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.all.accept_ra</title>
                  <description xml:lang="en-US">Accept all router advertisements?</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_redirects_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.all.accept_redirects</title>
                  <description xml:lang="en-US">Toggle ICMP Redirect Acceptance</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.all.accept_source_route</title>
                  <description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_forwarding_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.all.forwarding</title>
                  <description xml:lang="en-US">Toggle IPv6 Forwarding</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.default.accept_ra</title>
                  <description xml:lang="en-US">Accept default router advertisements by default?</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.default.accept_redirects</title>
                  <description xml:lang="en-US">Toggle ICMP Redirect Acceptance By Default</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_source_route_value" type="number">
                  <title xml:lang="en-US">net.ipv6.conf.default.accept_source_route</title>
                  <description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</description>
                  <value>0</value>
                  <value selector="disabled">0</value>
                  <value selector="enabled">1</value>
                </Value>
                <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route" selected="false" severity="medium">
                  <version>SLES-12-030361</version>
                  <title xml:lang="en-US">Configure Kernel Parameter for Accepting IPv6 Source-Routed Packets for All Interfaces</title>
                  <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv6.conf.all.accept_source_route</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv6.conf.all.accept_source_route = 0</html:pre></description>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030361</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-96517r1_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                  <rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router, which can
be used to bypass network security measures. This requirement applies only to the
forwarding of source-routerd traffic, such as when IPv6 forwarding is enabled and
the system is functioning as a router.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Accepting source-routed packets in the IPv6 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <fix id="sysctl_net_ipv6_conf_all_accept_source_route" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv6_conf_all_accept_source_route_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" use="legacy"/>"

#
# Set runtime for net.ipv6.conf.all.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv6.conf.all.accept_source_route=$sysctl_net_ipv6_conf_all_accept_source_route_value

#
# If net.ipv6.conf.all.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv6.conf.all.accept_source_route = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv6.conf.all.accept_source_route' "$sysctl_net_ipv6_conf_all_accept_source_route_value" ''
</fix>
                  <fix id="sysctl_net_ipv6_conf_all_accept_source_route" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv6_conf_all_accept_source_route_value # promote to variable
  set_fact:
    sysctl_net_ipv6_conf_all_accept_source_route_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv6.conf.all.accept_source_route is set
  sysctl:
    name: net.ipv6.conf.all.accept_source_route
    value: '{{ sysctl_net_ipv6_conf_all_accept_source_route_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv6_conf_all_accept_source_route
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-171-3.1.20
    - DISA-STIG-030361
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value"/>
                    <check-content-ref name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="false" severity="medium">
                  <version>SLES-12-030401</version>
                  <title xml:lang="en-US">Configure Accepting IPv6 Redirects By Default</title>
                  <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv6.conf.default.accept_redirects</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv6.conf.default.accept_redirects = 0</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030401</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-96519r1_rule</reference>
                  <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.3.2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001551</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                  <rationale xml:lang="en-US">An illicit ICMP redirect message could result in a man-in-the-middle attack.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <fix id="sysctl_net_ipv6_conf_default_accept_redirects" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv6_conf_default_accept_redirects_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" use="legacy"/>"

#
# Set runtime for net.ipv6.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv6.conf.default.accept_redirects=$sysctl_net_ipv6_conf_default_accept_redirects_value

#
# If net.ipv6.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv6.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv6.conf.default.accept_redirects' "$sysctl_net_ipv6_conf_default_accept_redirects_value" ''
</fix>
                  <fix id="sysctl_net_ipv6_conf_default_accept_redirects" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv6_conf_default_accept_redirects_value # promote to variable
  set_fact:
    sysctl_net_ipv6_conf_default_accept_redirects_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv6.conf.default.accept_redirects is set
  sysctl:
    name: net.ipv6.conf.default.accept_redirects
    value: '{{ sysctl_net_ipv6_conf_default_accept_redirects_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv6_conf_default_accept_redirects
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-CM-7
    - NIST-800-171-3.1.20
    - DISA-STIG-030401
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value"/>
                    <check-content-ref name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests">
                <title xml:lang="en-US">Limit Network-Transmitted Configuration if Using Static IPv6 Addresses</title>
                <description xml:lang="en-US">To limit the configuration information requested from other
systems and accepted from the network on a system that uses
statically-configured IPv6 addresses, add the following lines to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv6.conf.default.router_solicitations = 0
net.ipv6.conf.default.accept_ra_rtr_pref = 0
net.ipv6.conf.default.accept_ra_pinfo = 0
net.ipv6.conf.default.accept_ra_defrtr = 0
net.ipv6.conf.default.autoconf = 0
net.ipv6.conf.default.dad_transmits = 0
net.ipv6.conf.default.max_addresses = 1</html:pre>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">router_solicitations</html:code> setting determines how many router
solicitations are sent when bringing up the interface. If addresses are
statically assigned, there is no need to send any solicitations.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">accept_ra_pinfo</html:code> setting controls whether the system will accept
prefix info from the router.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">accept_ra_defrtr</html:code> setting controls whether the system will accept
Hop Limit settings from a router advertisement. Setting it to 0 prevents a
router from changing your default IPv6 Hop Limit for outgoing packets.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">autoconf</html:code> setting controls whether router advertisements can cause
the system to assign a global unicast address to an interface.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">dad_transmits</html:code> setting determines how many neighbor solicitations
to send out per address (global and link-local) when bringing up an interface
to ensure the desired address is unique on the network.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The <html:code xmlns:html="http://www.w3.org/1999/xhtml">max_addresses</html:code> setting determines how many global unicast IPv6
addresses can be assigned to each interface.  The default is 16, but it should
be set to exactly the number of statically configured global addresses
required.</description>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_disabling_ipv6">
              <title xml:lang="en-US">Disable Support for IPv6 Unless Needed</title>
              <description xml:lang="en-US">Despite configuration that suggests support for IPv6 has
been disabled, link-local IPv6 address auto-configuration occurs
even when only an IPv4 address is assigned. The only way to
effectively prevent execution of the IPv6 networking stack is to
instruct the system not to activate the IPv6 kernel module.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="false" severity="medium">
                <title xml:lang="en-US">Disable IPv6 Networking Support Automatic Loading</title>
                <description xml:lang="en-US">To prevent the IPv6 kernel module (<html:code xmlns:html="http://www.w3.org/1999/xhtml">ipv6</html:code>) from binding to the
IPv6 networking stack, add the following line to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d/disabled.conf</html:code> (or another file in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d</html:code>):
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">options ipv6 disable=1</html:pre>
This permits the IPv6 module to be loaded (and thus satisfy other modules that
depend on it), while disabling support for the IPv6 protocol.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">Any unnecessary network stacks - including IPv6 - should be disabled, to reduce
the vulnerability to exploitation.</rationale>
                <fix id="kernel_module_ipv6_option_disabled" system="urn:xccdf:fix:script:sh">
# Prevent the IPv6 kernel module (ipv6) from loading the IPv6 networking stack
echo "options ipv6 disable=1" &gt; /etc/modprobe.d/ipv6.conf

# Since according to: https://access.redhat.com/solutions/72733
# "ipv6 disable=1" options doesn't always disable the IPv6 networking stack from
# loading, instruct also sysctl configuration to disable IPv6 according to:
# https://access.redhat.com/solutions/8709#rhel6disable

declare -a IPV6_SETTINGS=("net.ipv6.conf.all.disable_ipv6" "net.ipv6.conf.default.disable_ipv6")

for setting in ${IPV6_SETTINGS[@]}
do
	# Set runtime =1 for setting
	/sbin/sysctl -q -n -w "$setting=1"

	# If setting is present in /etc/sysctl.conf, change value to "1"
	# else, add "$setting = 1" to /etc/sysctl.conf
	if grep -q ^"$setting" /etc/sysctl.conf ; then
		sed -i "s/^$setting.*/$setting = 1/g" /etc/sysctl.conf
	else
		echo "" &gt;&gt; /etc/sysctl.conf
		echo "# Set $setting = 1 per security requirements" &gt;&gt; /etc/sysctl.conf
		echo "$setting = 1" &gt;&gt; /etc/sysctl.conf
	fi
done
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-kernel_module_ipv6_option_disabled:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-kernel">
            <title xml:lang="en-US">Kernel Parameters Which Affect Networking</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">sysctl</html:code> utility is used to set
parameters which affect the operation of the Linux kernel. Kernel parameters
which affect networking and have security implications are described here.</description>
            <Group id="xccdf_org.ssgproject.content_group_network_host_and_router_parameters">
              <title xml:lang="en-US">Network Related Kernel Runtime Parameters for Hosts and Routers</title>
              <description xml:lang="en-US">Certain kernel parameters should be set for systems which are
acting as either hosts or routers to improve the system's ability defend
against certain types of IPv4 protocol attacks.</description>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.all.accept_redirects</title>
                <description xml:lang="en-US">Disable ICMP Redirect Acceptance</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.all.accept_source_route</title>
                <description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.all.log_martians</title>
                <description xml:lang="en-US">Disable so you don't Log Spoofed Packets, Source
Routed Packets, Redirect Packets</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.all.rp_filter</title>
                <description xml:lang="en-US">Enable to enforce sanity checking, also called ingress
filtering or egress filtering. The point is to drop a packet if the
source and destination IP addresses in the IP header do not make
sense when considered in light of the physical interface on which
it arrived.</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.all.secure_redirects</title>
                <description xml:lang="en-US">Enable to prevent hijacking of routing path by only
allowing redirects from gateways known in routing
table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.default.accept_redirects</title>
                <description xml:lang="en-US">Disable ICMP Redirect Acceptance?</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.default.accept_source_route</title>
                <description xml:lang="en-US">Disable IP source routing?</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_log_martians_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.default.log_martians</title>
                <description xml:lang="en-US">Disable so you don't Log Spoofed Packets, Source
Routed Packets, Redirect Packets</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.default.rp_filter</title>
                <description xml:lang="en-US">Enables source route verification</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" type="number">
                <title xml:lang="en-US">net.ipv4.conf.default.secure_redirects</title>
                <description xml:lang="en-US">Enable to prevent hijacking of routing path by only
allowing redirects from gateways known in routing
table. Disable to refuse acceptance of secure ICMP redirected packages by default.</description>
                <value>0</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" type="number">
                <title xml:lang="en-US">net.ipv4.icmp_echo_ignore_broadcasts</title>
                <description xml:lang="en-US">Ignore all ICMP ECHO and TIMESTAMP requests sent to it
via broadcast/multicast</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" type="number">
                <title xml:lang="en-US">net.ipv4.icmp_ignore_bogus_error_responses</title>
                <description xml:lang="en-US">Enable to prevent unnecessary logging</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" type="number">
                <title xml:lang="en-US">net.ipv4.tcp_syncookies</title>
                <description xml:lang="en-US">Enable to turn on TCP SYN Cookie
Protection</description>
                <value>1</value>
                <value selector="disabled">0</value>
                <value selector="enabled">1</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="false" severity="medium">
                <version>SLES-12-030390</version>
                <title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.accept_redirects</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.all.accept_redirects=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.accept_redirects = 0</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030390</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92189r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001503</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001551</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">ICMP redirect messages are used by routers to inform hosts that a more
direct route exists for a particular destination. These messages modify the
host's route table and are unauthenticated. An illicit ICMP redirect
message could result in a man-in-the-middle attack.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This feature of the IPv4 protocol has few legitimate uses. It should be
disabled unless absolutely required.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_all_accept_redirects" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_conf_all_accept_redirects_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" use="legacy"/>"

#
# Set runtime for net.ipv4.conf.all.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_redirects=$sysctl_net_ipv4_conf_all_accept_redirects_value

#
# If net.ipv4.conf.all.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.conf.all.accept_redirects = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.all.accept_redirects' "$sysctl_net_ipv4_conf_all_accept_redirects_value" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_all_accept_redirects" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_conf_all_accept_redirects_value # promote to variable
  set_fact:
    sysctl_net_ipv4_conf_all_accept_redirects_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.conf.all.accept_redirects is set
  sysctl:
    name: net.ipv4.conf.all.accept_redirects
    value: '{{ sysctl_net_ipv4_conf_all_accept_redirects_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_all_accept_redirects
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030390
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="false" severity="medium">
                <version>SLES-12-030360</version>
                <title xml:lang="en-US">Configure Kernel Parameter for Accepting IPv4 Source-Routed Packets for All Interfaces</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.accept_source_route</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.all.accept_source_route=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.accept_source_route = 0</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030360</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92183r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router,
which can be used to bypass network security measures. This requirement
applies only to the forwarding of source-routerd traffic, such as when IPv4
forwarding is enabled and the system is functioning as a router.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_all_accept_source_route" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_conf_all_accept_source_route_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" use="legacy"/>"

#
# Set runtime for net.ipv4.conf.all.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_source_route=$sysctl_net_ipv4_conf_all_accept_source_route_value

#
# If net.ipv4.conf.all.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.conf.all.accept_source_route = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.all.accept_source_route' "$sysctl_net_ipv4_conf_all_accept_source_route_value" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_all_accept_source_route" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_conf_all_accept_source_route_value # promote to variable
  set_fact:
    sysctl_net_ipv4_conf_all_accept_source_route_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.conf.all.accept_source_route is set
  sysctl:
    name: net.ipv4.conf.all.accept_source_route
    value: '{{ sysctl_net_ipv4_conf_all_accept_source_route_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_all_accept_source_route
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-171-3.1.20
    - DISA-STIG-030360
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="false" severity="medium">
                <version>SLES-12-030400</version>
                <title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects By Default</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.accept_redirects</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.default.accept_redirects=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.accept_redirects = 0</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030400</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92191r4_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001551</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">ICMP redirect messages are used by routers to inform hosts that a more
direct route exists for a particular destination. These messages modify the
host's route table and are unauthenticated. An illicit ICMP redirect
message could result in a man-in-the-middle attack.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>This feature of the IPv4 protocol has few legitimate uses. It should
be disabled unless absolutely required.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_default_accept_redirects" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_conf_default_accept_redirects_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" use="legacy"/>"

#
# Set runtime for net.ipv4.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_redirects=$sysctl_net_ipv4_conf_default_accept_redirects_value

#
# If net.ipv4.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.default.accept_redirects' "$sysctl_net_ipv4_conf_default_accept_redirects_value" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_default_accept_redirects" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_conf_default_accept_redirects_value # promote to variable
  set_fact:
    sysctl_net_ipv4_conf_default_accept_redirects_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.conf.default.accept_redirects is set
  sysctl:
    name: net.ipv4.conf.default.accept_redirects
    value: '{{ sysctl_net_ipv4_conf_default_accept_redirects_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_default_accept_redirects
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-53-SC-7
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030400
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="false" severity="medium">
                <version>SLES-12-030370</version>
                <title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets By Default</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.accept_source_route</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.accept_source_route = 0</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030370</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92185r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001551</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router,
which can be used to bypass network security measures.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required, such as when
IPv4 forwarding is enabled and the system is legitimately functioning as a
router.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_default_accept_source_route" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_conf_default_accept_source_route_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" use="legacy"/>"

#
# Set runtime for net.ipv4.conf.default.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_source_route=$sysctl_net_ipv4_conf_default_accept_source_route_value

#
# If net.ipv4.conf.default.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.conf.default.accept_source_route = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.default.accept_source_route' "$sysctl_net_ipv4_conf_default_accept_source_route_value" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_default_accept_source_route" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_conf_default_accept_source_route_value # promote to variable
  set_fact:
    sysctl_net_ipv4_conf_default_accept_source_route_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.conf.default.accept_source_route is set
  sysctl:
    name: net.ipv4.conf.default.accept_source_route
    value: '{{ sysctl_net_ipv4_conf_default_accept_source_route_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_default_accept_source_route
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-53-SC-7
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030370
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="false" severity="medium">
                <version>SLES-12-030380</version>
                <title xml:lang="en-US">Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.icmp_echo_ignore_broadcasts</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.icmp_echo_ignore_broadcasts = 1</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030380</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92187r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">Responding to broadcast (ICMP) echoes facilitates network mapping
and provides a vector for amplification attacks.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Ignoring ICMP echo requests (pings) sent to broadcast or multicast
addresses makes the system slightly more difficult to enumerate on the network.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" use="legacy"/>"

#
# Set runtime for net.ipv4.icmp_echo_ignore_broadcasts
#
/sbin/sysctl -q -n -w net.ipv4.icmp_echo_ignore_broadcasts=$sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value

#
# If net.ipv4.icmp_echo_ignore_broadcasts present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.icmp_echo_ignore_broadcasts = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.icmp_echo_ignore_broadcasts' "$sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" ''
</fix>
                <fix id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value # promote to variable
  set_fact:
    sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.icmp_echo_ignore_broadcasts is set
  sysctl:
    name: net.ipv4.icmp_echo_ignore_broadcasts
    value: '{{ sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_icmp_echo_ignore_broadcasts
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030380
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="false" severity="medium">
                <version>SLES-12-030350</version>
                <title xml:lang="en-US">Configure Kernel Parameter to Use TCP Syncookies</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.tcp_syncookies</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.tcp_syncookies=1</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.tcp_syncookies = 1</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001095</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(2)</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000142-GPOS-00071</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030350</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92181r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.2.8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(1)(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(3)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">A TCP SYN flood attack can cause a denial of service by filling a
system's TCP connection table with connections in the SYN_RCVD state.
Syncookies can be used to track a connection when a subsequent ACK is received,
verifying the initiator is attempting a valid connection and is not a flood
source. This feature is activated when a flood condition is detected, and
enables the system to continue servicing valid connection requests.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_tcp_syncookies" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">
sysctl_net_ipv4_tcp_syncookies_value="<sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" use="legacy"/>"

#
# Set runtime for net.ipv4.tcp_syncookies
#
/sbin/sysctl -q -n -w net.ipv4.tcp_syncookies=$sysctl_net_ipv4_tcp_syncookies_value

#
# If net.ipv4.tcp_syncookies present in /etc/sysctl.conf, change value to appropriate value
#	else, add "net.ipv4.tcp_syncookies = value" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.tcp_syncookies' "$sysctl_net_ipv4_tcp_syncookies_value" ''
</fix>
                <fix id="sysctl_net_ipv4_tcp_syncookies" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: XCCDF Value sysctl_net_ipv4_tcp_syncookies_value # promote to variable
  set_fact:
    sysctl_net_ipv4_tcp_syncookies_value: !!str <sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" use="legacy"/>
  tags:
    - always

- name: Ensure sysctl net.ipv4.tcp_syncookies is set
  sysctl:
    name: net.ipv4.tcp_syncookies
    value: '{{ sysctl_net_ipv4_tcp_syncookies_value }}'
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_tcp_syncookies
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-SC-5(1)(2)
    - NIST-800-53-SC-5(2)
    - NIST-800-53-SC-5(3)
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030350
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value"/>
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_network_host_parameters">
              <title xml:lang="en-US">Network Parameters for Hosts Only</title>
              <description xml:lang="en-US">If the system is not going to be used as a router, then setting certain
kernel parameters ensure that the host will not perform routing
of network traffic.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="false" severity="medium">
                <version>SLES-12-030420</version>
                <title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.send_redirects</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.all.send_redirects=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.all.send_redirects = 0</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030420</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92195r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.1.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(1)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">ICMP redirect messages are used by routers to inform hosts that a more
direct route exists for a particular destination. These messages contain information
from the system's route table possibly revealing portions of the network topology.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The ability to send ICMP redirects is only appropriate for systems acting as routers.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_all_send_redirects" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for net.ipv4.conf.all.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.send_redirects=0

#
# If net.ipv4.conf.all.send_redirects present in /etc/sysctl.conf, change value to "0"
#	else, add "net.ipv4.conf.all.send_redirects = 0" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.all.send_redirects' "0" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_all_send_redirects" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl net.ipv4.conf.all.send_redirects is set to 0
  sysctl:
    name: net.ipv4.conf.all.send_redirects
    value: 0
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_all_send_redirects
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5(1)
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030420
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="false" severity="medium">
                <version>SLES-12-030410</version>
                <title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects by Default</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.send_redirects</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.conf.default.send_redirects=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.conf.default.send_redirects = 0</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030410</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92193r4_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.1.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.1</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.AE-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.AM-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">ICMP redirect messages are used by routers to inform hosts that a more
direct route exists for a particular destination. These messages contain information
from the system's route table possibly revealing portions of the network topology.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The ability to send ICMP redirects is only appropriate for systems acting as routers.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_conf_default_send_redirects" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for net.ipv4.conf.default.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.send_redirects=0

#
# If net.ipv4.conf.default.send_redirects present in /etc/sysctl.conf, change value to "0"
#	else, add "net.ipv4.conf.default.send_redirects = 0" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.conf.default.send_redirects' "0" ''
</fix>
                <fix id="sysctl_net_ipv4_conf_default_send_redirects" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl net.ipv4.conf.default.send_redirects is set to 0
  sysctl:
    name: net.ipv4.conf.default.send_redirects
    value: 0
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_conf_default_send_redirects
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-AC-4
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-53-SC-7
    - NIST-800-171-3.1.20
    - CJIS-5.10.1.1
    - DISA-STIG-030410
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="false" severity="medium">
                <version>SLES-12-030430</version>
                <title xml:lang="en-US">Disable Kernel Parameter for IP Forwarding</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.ip_forward</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w net.ipv4.ip_forward=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">net.ipv4.ip_forward = 0</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030430</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92197r3_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">3.1.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.20</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">Forwarding packets between different interfaces can facilitate unauthorized
data transfers. The ability to forward packets is therefore only
appropriate for routers.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_net_ipv4_ip_forward" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for net.ipv4.ip_forward
#
/sbin/sysctl -q -n -w net.ipv4.ip_forward=0

#
# If net.ipv4.ip_forward present in /etc/sysctl.conf, change value to "0"
#	else, add "net.ipv4.ip_forward = 0" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^net.ipv4.ip_forward' "0" ''
</fix>
                <fix id="sysctl_net_ipv4_ip_forward" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl net.ipv4.ip_forward is set to 0
  sysctl:
    name: net.ipv4.ip_forward
    value: 0
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_net_ipv4_ip_forward
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-CM-7
    - NIST-800-53-SC-5
    - NIST-800-53-SC-32
    - NIST-800-171-3.1.20
    - DISA-STIG-030430
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-uncommon">
            <title xml:lang="en-US">Uncommon Network Protocols</title>
            <description xml:lang="en-US">The system includes support for several network protocols which are not commonly used.
Although security vulnerabilities in kernel networking code are not frequently discovered,
the consequences can be dramatic. Ensuring uncommon network protocols are disabled
reduces the system's risk to attacks targeted at its implementation of those protocols.</description>
            <warning xml:lang="en-US" category="general">Although these protocols are not commonly used, avoid disruption
in your network environment by ensuring they are not needed
prior to disabling them.</warning>
            <Rule id="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="false" severity="unknown">
              <title xml:lang="en-US">Disable RDS Support</title>
              <description xml:lang="en-US">The Reliable Datagram Sockets (RDS) protocol is a transport
layer protocol designed to provide reliable high- bandwidth,
low-latency communications between nodes in a cluster.

To configure the system to prevent the <html:code xmlns:html="http://www.w3.org/1999/xhtml">rds</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">install rds /bin/true</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">Disabling RDS protects
the system against exploitation of any flaws in its implementation.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="false" severity="medium">
              <title xml:lang="en-US">Disable TIPC Support</title>
              <description xml:lang="en-US">The Transparent Inter-Process Communication (TIPC) protocol
is designed to provide communications between nodes in a
cluster.

To configure the system to prevent the <html:code xmlns:html="http://www.w3.org/1999/xhtml">tipc</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">install tipc /bin/true</html:pre></description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">Disabling TIPC protects
the system against exploitation of any flaws in its implementation.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-wireless">
            <title xml:lang="en-US">Wireless Networking</title>
            <description xml:lang="en-US">Wireless networking, such as 802.11
(WiFi) and Bluetooth, can present a security risk to sensitive or
classified systems and networks. Wireless networking hardware is
much more likely to be included in laptop or portable systems than
in desktops or servers. 
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Removal of hardware provides the greatest assurance that the wireless
capability remains disabled. Acquisition policies often include provisions to
prevent the purchase of equipment that will be used in sensitive spaces and
includes wireless capabilities. If it is impractical to remove the wireless
hardware, and policy permits the device to enter sensitive spaces as long
as wireless is disabled, efforts should instead focus on disabling wireless capability
via software.</description>
            <Group id="xccdf_org.ssgproject.content_group_wireless_software">
              <title xml:lang="en-US">Disable Wireless Through Software Configuration</title>
              <description xml:lang="en-US">If it is impossible to remove the wireless hardware
from the device in question, disable as much of it as possible
through software. The following methods can disable software
support for wireless networking, but note that these methods do not
prevent malicious software or careless users from re-activating the
devices.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="false" severity="medium">
                <version>SLES-12-030450</version>
                <title xml:lang="en-US">Deactivate Wireless Network Interfaces</title>
                <description xml:lang="en-US">Deactivating wireless network interfaces should prevent
normal usage of the wireless capability.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Configure the system to disable wireless network interfaces by issuing the
following command for every active <html:code xmlns:html="http://www.w3.org/1999/xhtml">&lt;WIFI-INTERFACE&gt;</html:code> in the system:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo wicked ifdown &lt;WIFI-INTERFACE&gt;</html:pre>
Also remove the configuration files for every wifi adapter from
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/wicked/ifconfig/&lt;WIFI-INTERFACE&gt;.xml</html:code> to prevent future connections.</description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001443</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001444</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002418</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(1)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-8</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030450</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92201r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">4.3.1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.16</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000085</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002418</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(8)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000424-GPOS-00188</reference>
                <rationale xml:lang="en-US">The use of wireless networking can introduce many different attack vectors into
the organization's network. Common attack vectors such as malicious association
and ad hoc networks will allow an attacker to spoof a wireless access point
(AP), allowing validated systems to connect to the malicious AP and enabling the
attacker to monitor and record network traffic. These malicious APs can also
serve to create a man-in-the-middle attack or be used to create a denial of
service to valid network resources.</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-wireless_disable_interfaces:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-wireless_disable_interfaces_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces">
            <title xml:lang="en-US">Disable Unused Interfaces</title>
            <description xml:lang="en-US">Network interfaces expand the attack surface of the 
system.  Unused interfaces are not monitored or controlled, and 
should be disabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
If the system does not require network communications but still
needs to use the loopback interface, remove all files of the form
<html:code xmlns:html="http://www.w3.org/1999/xhtml">ifcfg-<html:i>interface</html:i></html:code> except for <html:code xmlns:html="http://www.w3.org/1999/xhtml">ifcfg-lo</html:code> from
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/network-scripts</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo rm /etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:pre>
If the system is a standalone machine with no need for network access or even
communication over the loopback device, then disable this service.
 The <html:code xmlns:html="http://www.w3.org/1999/xhtml">network</html:code> service can be disabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl disable network.service</html:pre></description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network_ssl">
            <title xml:lang="en-US">Transport Layer Security Support</title>
            <description xml:lang="en-US">Support for Transport Layer Security (TLS), and its predecessor, the Secure
Sockets Layer (SSL), is included in Red Hat Enterprise Linux in the OpenSSL software (RPM package
<html:code xmlns:html="http://www.w3.org/1999/xhtml">openssl</html:code>).  TLS provides encrypted and authenticated network
communications, and many network services include support for it.  TLS or SSL
can be leveraged to avoid any plaintext transmission of sensitive data.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For information on how to use OpenSSL, see
<html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://www.openssl.org/docs/">http://www.openssl.org/docs/</html:a></html:b>.  Information on FIPS validation
of OpenSSL is available at <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://www.openssl.org/docs/fips.html">http://www.openssl.org/docs/fips.html</html:a></html:b>
and <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm</html:a></html:b>.</description>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_network-susefirewall2">
            <title xml:lang="en-US">SuSEfirewall2</title>
            <description xml:lang="en-US">The SuSEfirewall2 provides a managed firewall.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_susefirewall2_ddos_protection" selected="false" severity="medium">
              <version>SLES-12-030040</version>
              <title xml:lang="en-US">Enable DoS Protections in SuSEfirewall2</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">SuSEfirewall2</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install SuSEfirewall2</html:pre>

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">SuSEfirewall2</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable SuSEfirewall2.service</html:pre>

Verify "SuSEfirewall2" is configured to protect the SUSE operating system against or limit the effects of DoS attacks. 

Run the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep -i fw_services_accept_ext /etc/sysconfig/SuSEfirewall2
FW_SERVICES_ACCEPT_EXT="0/0,tcp,22,,hitcount=3,blockseconds=60,recentname=ssh"</html:pre>

If the "FW_SERVICES_ACCEPT_EXT" rule does not contain both the <html:code xmlns:html="http://www.w3.org/1999/xhtml">hitcount</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">blockseconds</html:code> parameters, this is a finding.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030040</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92133r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002385</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</reference>
              <rationale xml:lang="en-US">DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.

This requirement addresses the configuration of the SUSE operating system to mitigate the impact on system availability of DoS attacks that have occurred or are ongoing. For each system, known and potential DoS attacks must be identified and solutions for each type implemented. A variety of technologies exist to limit or, in some cases, eliminate the effects of DoS attacks (e.g., limiting processes or establishing memory partitions). Employing increased capacity and bandwidth, combined with service redundancy, may reduce the susceptibility to some DoS attacks.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-susefirewall2_ddos_protection:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-susefirewall2_ddos_protection_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_susefirewall2_only_required_services" selected="false" severity="medium">
              <version>SLES-12-030030</version>
              <title xml:lang="en-US">Only Allow Authorized Network Services in SuSEfirewall2</title>
              <description xml:lang="en-US">Verify "SuSEfirewall2" is configured to protect the SUSE operating system against or limit the effects of DoS attacks. 

Run the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep -i fw_services_accept_ext /etc/sysconfig/SuSEfirewall2
FW_SERVICES_ACCEPT_EXT="0/0,tcp,22,,hitcount=3,blockseconds=60,recentname=ssh"</html:pre>

If the "FW_SERVICES_ACCEPT_EXT" rule does not contain both the <html:code xmlns:html="http://www.w3.org/1999/xhtml">hitcount</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">blockseconds</html:code> parameters, this is a finding.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030030</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92131r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000382</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002080</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002314</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(5)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</reference>
              <rationale xml:lang="en-US">To prevent unauthorized connection of devices, unauthorized transfer of
information, or unauthorized tunneling (i.e., embedding of data types
within data types), organizations must disable or restrict unused or
unnecessary physical and logical ports/protocols on information systems.

SUSE operating systems are capable of providing a wide variety of functions
and services. Some of the functions and services provided by default may
not be necessary to support essential organizational operations.
Additionally, it is sometimes convenient to provide multiple services from
a single component (e.g., VPN and IPS); however, doing so increases risk
over limiting the services provided by any one component.

To support the requirements and principles of least functionality, the SUSE
operating system must support the organizational requirements, providing
only essential capabilities and limiting the use of ports, protocols,
and/or services to only those required, authorized, and approved to conduct
official business or address authorized quality-of-life issues.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-susefirewall2_only_required_services_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_service_SuSEfirewall2_enabled" selected="false" severity="medium">
              <title xml:lang="en-US">Enable the SuSEfirewall 2</title>
              <description xml:lang="en-US"> The <html:code xmlns:html="http://www.w3.org/1999/xhtml">SuSEfirewall2</html:code> service can be enabled with the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable SuSEfirewall2.service</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000382</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(5)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</reference>
              <rationale xml:lang="en-US">To prevent unauthorized connection of devices, unauthorized transfer of
information, or unauthorized tunneling (i.e., embedding of data types
within data types), organizations must disable or restrict unused or
unnecessary physical and logical ports/protocols on information systems.

SUSE operating systems are capable of providing a wide variety of functions
and services. Some of the functions and services provided by default may
not be necessary to support essential organizational operations.
Additionally, it is sometimes convenient to provide multiple services from
a single component (e.g., VPN and IPS); however, doing so increases risk
over limiting the services provided by any one component.</rationale>
              <fix id="service_SuSEfirewall2_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'SuSEfirewall2' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'SuSEfirewall2.service'
"$SYSTEMCTL_EXEC" enable 'SuSEfirewall2.service'
</fix>
              <fix id="service_SuSEfirewall2_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service SuSEfirewall2
  service:
    name: SuSEfirewall2
    enabled: 'yes'
    state: started
  tags:
    - service_SuSEfirewall2_enabled
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-CA-3(5)
    - NIST-800-53-AC-17(1)
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-service_SuSEfirewall2_enabled:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-service_SuSEfirewall2_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_permissions">
          <title xml:lang="en-US">File Permissions and Masks</title>
          <description xml:lang="en-US">Traditional Unix security relies heavily on file and
directory permissions to prevent unauthorized users from reading or
modifying files to which they should not have access.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Several of the commands in this section search filesystems
for files or directories with certain characteristics, and are
intended to be run on every local partition on a given system.
When the variable <html:i xmlns:html="http://www.w3.org/1999/xhtml">PART</html:i> appears in one of the commands below,
it means that the command is intended to be run repeatedly, with the
name of each local partition substituted for <html:i xmlns:html="http://www.w3.org/1999/xhtml">PART</html:i> in turn.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The following command prints a list of all xfs partitions on the local
system, which is the default filesystem for SUSE Linux Enterprise 12
installations:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ mount -t xfs | awk '{print $3}'</html:pre>
For any systems that use a different
local filesystem type, modify this command as appropriate.</description>
          <Group id="xccdf_org.ssgproject.content_group_files">
            <title xml:lang="en-US">Verify Permissions on Important Files and
Directories</title>
            <description xml:lang="en-US">Permissions for many files on a system must be set
restrictively to ensure sensitive information is properly protected.
This section discusses important
permission restrictions which can be verified
to ensure that no harmful discrepancies have
arisen.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="false" severity="medium">
              <version>SLES-12-010460</version>
              <title xml:lang="en-US">Verify that All World-Writable Directories Have Sticky Bits Set</title>
              <description xml:lang="en-US">When the so-called 'sticky bit' is set on a directory,
only the owner of a given file may remove that file from the
directory. Without the sticky bit, any user with write access to a
directory may remove any file in the directory. Setting the sticky
bit prevents users from removing each other's files. In cases where
there is no reason for a directory to be world-writable, a better
solution is to remove that permission rather than to set the sticky
bit. However, if a directory is used by a particular application,
consult that application's documentation instead of blindly
changing modes.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To set the sticky bit on a world-writable directory <html:i xmlns:html="http://www.w3.org/1999/xhtml">DIR</html:i>, run the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod +t <html:i>DIR</html:i></html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010460</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91845r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.21</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <rationale xml:lang="en-US">Failing to set the sticky bit on public directories allows unauthorized
users to delete files in the directory structure.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The only authorized public directories are those temporary directories
supplied with the system, or those designed to be temporary file
repositories. The setting is normally reserved for directories used by the
system, by users for temporary file storage (such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">/tmp</html:code>), and
for directories requiring global read/write access.</rationale>
              <fix id="dir_perms_world_writable_sticky_bits" system="urn:xccdf:fix:script:sh">df --local -P | awk {'if (NR!=1) print $6'} \
| xargs -I '{}' find '{}' -xdev -type d \
\( -perm -0002 -a ! -perm -1000 \) 2&gt;/dev/null \
| xargs chmod a+t
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_systemmap" selected="false" severity="unknown">
              <title xml:lang="en-US">Verify that local System.map file (if exists) is readable only by root</title>
              <description xml:lang="en-US">Files containing sensitive informations should be protected by restrictive
  permissions. Most of the time, there is no need that these files need to be read by any non-root user

To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/boot/System.map-*</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0600 /boot/System.map-*</html:pre></description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R13)</reference>
              <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">System.map</html:code> file contains information about kernel symbols and
  can give some hints to generate local exploitation.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permissions_systemmap:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_systemmap_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure All SGID Executables Are Authorized</title>
              <description xml:lang="en-US">The SGID (set group id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SGID files.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <rationale xml:lang="en-US">Executable files with the SGID permission run with the privileges of
the owner of the file. SGID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure All SUID Executables Are Authorized</title>
              <description xml:lang="en-US">The SUID (set user id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SUID files.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <rationale xml:lang="en-US">Executable files with the SUID permission run with the privileges of
the owner of the file. SUID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure No World-Writable Files Exist</title>
              <description xml:lang="en-US">It is generally a good idea to remove global (other) write
access to a file when it is discovered. However, check with
documentation for specific applications before making changes.
Also, monitor for recurring world-writable files, as these may be
symptoms of a misconfigured application or user account. Finally,
this applies to real files and not virtual files that are a part of
pseudo file systems such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">sysfs</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">procfs</html:code>.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.10</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <rationale xml:lang="en-US">Data in world-writable files can be modified by any
user on the system. In almost all circumstances, files can be
configured using a combination of user and group permissions to
support whatever legitimate access is needed without the risk
caused by world-writable files.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="false" severity="medium">
              <version>SLES-12-010700</version>
              <title xml:lang="en-US">Ensure All Files Are Owned by a Group</title>
              <description xml:lang="en-US">If any files are not owned by a group, then the
cause of their lack of group-ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate group.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010700</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91889r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002165</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permissions_ungroupowned:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="false" severity="medium">
              <version>SLES-12-010690</version>
              <title xml:lang="en-US">Ensure All Files Are Owned by a User</title>
              <description xml:lang="en-US">If any files are not owned by a user, then the
cause of their lack of ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate user.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010690</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91883r3_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002165</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(4)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-no_files_unowned_by_user:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sysctl_fs_protected_hardlinks" selected="false" severity="unknown">
              <title xml:lang="en-US">Disallow creating symlinks to a file you not own</title>
              <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">fs.protected_hardlinks</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w fs.protected_hardlinks=1</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">fs.protected_hardlinks = 1</html:pre></description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R23)</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.6.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
              <rationale xml:lang="en-US">Disallowing such hardlink mitigate vulnerabilities based on insecure file system
accessed by privilegied programs, avoiding an exploitation vector exploiting unsafe use of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">open()</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">creat()</html:code>.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sysctl_fs_protected_hardlinks_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sysctl_fs_protected_symlinks" selected="false" severity="unknown">
              <title xml:lang="en-US">Disallow creating symlinks to a file you not own</title>
              <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">fs.protected_symlinks</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w fs.protected_symlinks=1</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">fs.protected_symlinks = 1</html:pre></description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R23)</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.6.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
              <rationale xml:lang="en-US">Disallowing such symlink mitigate vulnerabilities based on insecure file system
accessed by privilegied programs, avoiding an exploitation vector exploiting unsafe use of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">open()</html:code> or <html:code xmlns:html="http://www.w3.org/1999/xhtml">creat()</html:code>.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sysctl_fs_protected_symlinks_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_groupowned" selected="false" severity="medium">
              <version>SLES-12-010830</version>
              <title xml:lang="en-US">Ensure All World-Writable Directories Are Group-Owned by a System Group</title>
              <description xml:lang="en-US">All directories in local partitions which are world-writable should be
group-owned by <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">sys</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">bin</html:code> or an application
group. If any world-writable directories are not group-owned by such a
group, this should be investigated. Following this, the files should be
deleted or assigned to an appropriate group.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010830</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91949r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">If a world-writable directory has the sticky bit set and is not group-owned
by a privileged Group Identifier (GID), unauthorized users may be able to
modify files created by others.

The only authorized public directories are those temporary directories
supplied with the system or those designed to be temporary file
repositories. The setting is normally reserved for directories used by the
system and by users for temporary file storage, (e.g., <html:code xmlns:html="http://www.w3.org/1999/xhtml">/tmp</html:code>), and
for directories requiring global read/write access.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-dir_perms_world_writable_system_groupowned:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-dir_perms_world_writable_system_groupowned_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_permissions_important_account_files">
              <title xml:lang="en-US">Verify Permissions on Files with Local Account Information and Credentials</title>
              <description xml:lang="en-US">The default restrictive permissions for files which act as
important security databases such as <html:code xmlns:html="http://www.w3.org/1999/xhtml">passwd</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">shadow</html:code>,
<html:code xmlns:html="http://www.w3.org/1999/xhtml">group</html:code>, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">gshadow</html:code> files must be maintained.  Many utilities
need read access to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">passwd</html:code> file in order to function properly, but
read access to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">shadow</html:code> file allows malicious attacks against system
passwords, and should never be enabled.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Group Who Owns group File</title>
                <description xml:lang="en-US"> To properly set the group owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/group</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp root /etc/group</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</rationale>
                <fix id="file_groupowner_etc_group" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chgrp 0 /etc/group
</fix>
                <fix id="file_groupowner_etc_group" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/group
  stat:
    path: /etc/group
  register: file_exists
  tags:
    - file_groupowner_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure group owner 0 on /etc/group
  file:
    path: /etc/group
    group: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_groupowner_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_groupowner_etc_group:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Group Who Owns gshadow File</title>
                <description xml:lang="en-US"> To properly set the group owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp root /etc/gshadow</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</rationale>
                <fix id="file_groupowner_etc_gshadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chgrp 0 /etc/gshadow
</fix>
                <fix id="file_groupowner_etc_gshadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/gshadow
  stat:
    path: /etc/gshadow
  register: file_exists
  tags:
    - file_groupowner_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6

- name: Ensure group owner 0 on /etc/gshadow
  file:
    path: /etc/gshadow
    group: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_groupowner_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_groupowner_etc_gshadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Group Who Owns passwd File</title>
                <description xml:lang="en-US"> To properly set the group owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp root /etc/passwd</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</rationale>
                <fix id="file_groupowner_etc_passwd" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chgrp 0 /etc/passwd
</fix>
                <fix id="file_groupowner_etc_passwd" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/passwd
  stat:
    path: /etc/passwd
  register: file_exists
  tags:
    - file_groupowner_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure group owner 0 on /etc/passwd
  file:
    path: /etc/passwd
    group: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_groupowner_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_groupowner_etc_passwd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_shadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Group Who Owns shadow File</title>
                <description xml:lang="en-US"> To properly set the group owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp root /etc/shadow</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> file stores password hashes. Protection of this file is
critical for system security.</rationale>
                <fix id="file_groupowner_etc_shadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chgrp 0 /etc/shadow
</fix>
                <fix id="file_groupowner_etc_shadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/shadow
  stat:
    path: /etc/shadow
  register: file_exists
  tags:
    - file_groupowner_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure group owner 0 on /etc/shadow
  file:
    path: /etc/shadow
    group: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_groupowner_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_groupowner_etc_shadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_groupowner_etc_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="false" severity="medium">
                <title xml:lang="en-US">Verify User Who Owns group File</title>
                <description xml:lang="en-US"> To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/group</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /etc/group </html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</rationale>
                <fix id="file_owner_etc_group" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chown 0 /etc/group
</fix>
                <fix id="file_owner_etc_group" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/group
  stat:
    path: /etc/group
  register: file_exists
  tags:
    - file_owner_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure owner 0 on /etc/group
  file:
    path: /etc/group
    owner: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_owner_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_owner_etc_group:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify User Who Owns gshadow File</title>
                <description xml:lang="en-US"> To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /etc/gshadow </html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</rationale>
                <fix id="file_owner_etc_gshadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chown 0 /etc/gshadow
</fix>
                <fix id="file_owner_etc_gshadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/gshadow
  stat:
    path: /etc/gshadow
  register: file_exists
  tags:
    - file_owner_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6

- name: Ensure owner 0 on /etc/gshadow
  file:
    path: /etc/gshadow
    owner: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_owner_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_owner_etc_gshadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="false" severity="medium">
                <title xml:lang="en-US">Verify User Who Owns passwd File</title>
                <description xml:lang="en-US"> To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /etc/passwd </html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</rationale>
                <fix id="file_owner_etc_passwd" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chown 0 /etc/passwd
</fix>
                <fix id="file_owner_etc_passwd" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/passwd
  stat:
    path: /etc/passwd
  register: file_exists
  tags:
    - file_owner_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure owner 0 on /etc/passwd
  file:
    path: /etc/passwd
    owner: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_owner_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_owner_etc_passwd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_shadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify User Who Owns shadow File</title>
                <description xml:lang="en-US"> To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /etc/shadow </html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</rationale>
                <fix id="file_owner_etc_shadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chown 0 /etc/shadow
</fix>
                <fix id="file_owner_etc_shadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/shadow
  stat:
    path: /etc/shadow
  register: file_exists
  tags:
    - file_owner_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure owner 0 on /etc/shadow
  file:
    path: /etc/shadow
    owner: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_owner_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_owner_etc_shadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_owner_etc_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Permissions on group File</title>
                <description xml:lang="en-US">
To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0644 /etc/passwd</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.4</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</rationale>
                <fix id="file_permissions_etc_group" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chmod 0644 /etc/group
</fix>
                <fix id="file_permissions_etc_group" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/group
  stat:
    path: /etc/group
  register: file_exists
  tags:
    - file_permissions_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure permission 0644 on /etc/group
  file:
    path: /etc/group
    mode: 420
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_permissions_etc_group
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_permissions_etc_group:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Permissions on gshadow File</title>
                <description xml:lang="en-US">
To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0000 /etc/gshadow</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.5</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</rationale>
                <fix id="file_permissions_etc_gshadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chmod 0000 /etc/gshadow
</fix>
                <fix id="file_permissions_etc_gshadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/gshadow
  stat:
    path: /etc/gshadow
  register: file_exists
  tags:
    - file_permissions_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6

- name: Ensure permission 0000 on /etc/gshadow
  file:
    path: /etc/gshadow
    mode: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_permissions_etc_gshadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_permissions_etc_gshadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Permissions on passwd File</title>
                <description xml:lang="en-US">
To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0644 /etc/passwd</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.2</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">If the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/passwd</html:code> file is writable by a group-owner or the
world the risk of its compromise is increased. The file contains the list of
accounts on the system and associated information, and protection of this file
is critical for system security.</rationale>
                <fix id="file_permissions_etc_passwd" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chmod 0644 /etc/passwd
</fix>
                <fix id="file_permissions_etc_passwd" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/passwd
  stat:
    path: /etc/passwd
  register: file_exists
  tags:
    - file_permissions_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure permission 0644 on /etc/passwd
  file:
    path: /etc/passwd
    mode: 420
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_permissions_etc_passwd
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_permissions_etc_passwd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="false" severity="medium">
                <title xml:lang="en-US">Verify Permissions on shadow File</title>
                <description xml:lang="en-US">
To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0640 /etc/shadow</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">6.1.3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.2.2</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.7.c</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</rationale>
                <fix id="file_permissions_etc_shadow" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="configure">
chmod 0000 /etc/shadow
</fix>
                <fix id="file_permissions_etc_shadow" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="configure">- name: Test for existence /etc/shadow
  stat:
    path: /etc/shadow
  register: file_exists
  tags:
    - file_permissions_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2

- name: Ensure permission 0000 on /etc/shadow
  file:
    path: /etc/shadow
    mode: 0
  when: file_exists.stat is defined and file_exists.stat.exists
  tags:
    - file_permissions_etc_shadow
    - medium_severity
    - configure_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - PCI-DSS-Req-8.7.c
    - CJIS-5.5.2.2
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_permissions_etc_shadow:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_etc_security_opasswd" selected="false" severity="medium">
                <version>SLES-12-010300</version>
                <title xml:lang="en-US">Verify Permissions and Ownership of Old Passwords File</title>
                <description xml:lang="en-US"> To properly set the owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/opasswd</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root /etc/security/opasswd </html:pre>
To properly set the group owner of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/opasswd</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chgrp root /etc/security/opasswd</html:pre>
To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/opasswd</html:code>, run the command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0600 /etc/security/opasswd</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010300</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91815r1_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000200</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(e)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1).1(v)</reference>
                <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/opasswd</html:code> file stores old passwords to prevent password reuse.
Protection of this file is critical for system security.</rationale>
                <fix id="file_etc_security_opasswd" system="urn:xccdf:fix:script:sh">
[ -e /etc/security/opasswd ] || touch /etc/security/opasswd
chown root /etc/security/opasswd
chgrp root /etc/security/opasswd
chmod 0600 /etc/security/opasswd
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-file_etc_security_opasswd:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_etc_security_opasswd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_permissions_within_important_dirs">
              <title xml:lang="en-US">Verify File Permissions Within Some Important Directories</title>
              <description xml:lang="en-US">Some directories contain files whose confidentiality or integrity
is notably important and may also be susceptible to misconfiguration over time, particularly if
unpackaged software is installed. As such,
an argument exists to verify that files' permissions within these directories remain
configured correctly and restrictively.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="false" severity="medium">
                <title xml:lang="en-US">Verify that System Executables Have Root Ownership</title>
                <description xml:lang="en-US">System executables are stored in the following directories by default:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should be owned by the <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code> user.
If any file <html:i xmlns:html="http://www.w3.org/1999/xhtml">FILE</html:i> in these directories is found
to be owned by a user other than root, correct its ownership with the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root <html:i>FILE</html:i></html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">System binaries are executed by privileged users as well as system services,
and restrictive permissions are necessary to ensure that their
execution of these programs cannot be co-opted.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="false" severity="medium">
                <title xml:lang="en-US">Verify that Shared Library Files Have Root Ownership</title>
                <description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are also
stored in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/lib/modules</html:code>. All files in these directories should be
owned by the <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code> user. If the directory, or any file in these
directories, is found to be owned by a user other than root correct its
ownership with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chown root <html:i>FILE</html:i></html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Proper ownership is necessary to protect the integrity of the system.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="false" severity="medium">
                <title xml:lang="en-US">Verify that System Executables Have Restrictive Permissions</title>
                <description xml:lang="en-US">System executables are stored in the following directories by default:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should not be group-writable or world-writable.
If any file <html:i xmlns:html="http://www.w3.org/1999/xhtml">FILE</html:i> in these directories is found
to be group-writable or world-writable, correct its permission with the
following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod go-w <html:i>FILE</html:i></html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">System binaries are executed by privileged users, as well as system services,
and restrictive permissions are necessary to ensure execution of these programs
cannot be co-opted.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="false" severity="medium">
                <title xml:lang="en-US">Verify that Shared Library Files Have Restrictive Permissions</title>
                <description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are
stored in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/lib/modules</html:code>. All files in these directories
should not be group-writable or world-writable. If any file in these
directories is found to be group-writable or world-writable, correct
its permission with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod go-w <html:i>FILE</html:i></html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Restrictive permissions are necessary to protect the integrity of the system.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_mounting">
            <title xml:lang="en-US">Restrict Dynamic Mounting and Unmounting of
Filesystems</title>
            <description xml:lang="en-US">Linux includes a number of facilities for the automated addition
and removal of filesystems on a running system.  These facilities may be
necessary in many environments, but this capability also carries some risk -- whether direct
risk from allowing users to introduce arbitrary filesystems,
or risk that software flaws in the automated mount facility itself could
allow an attacker to compromise the system.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This command can be used to list the types of filesystems that are
available to the currently executing kernel:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ find /lib/modules/`uname -r`/kernel/fs -type f -name '*.ko'</html:pre>
If these filesystems are not required then they can be explicitly disabled
in a configuratio file in  <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d</html:code>.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="false" severity="medium">
              <version>SLES-12-010590</version>
              <title xml:lang="en-US">Disable the Automounter</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">autofs</html:code> daemon mounts and unmounts filesystems, such as user
home directories shared via NFS, on demand. In addition, autofs can be used to handle
removable media, and the default configuration provides the cdrom device as <html:code xmlns:html="http://www.w3.org/1999/xhtml">/misc/cd</html:code>.
However, this method of providing access to removable media is not common, so autofs
can almost always be disabled if NFS is not in use. Even if NFS is required, it may be
possible to configure filesystem mounts statically by editing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code>
rather than relying on the automounter.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">autofs</html:code> service can be disabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl disable autofs.service</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010590</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91863r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.22</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.6</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000778</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001958</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)(ii)(A)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)(2)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(iv)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000114-GPOS-00059</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000378-GPOS-00163</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Disabling the automounter permits the administrator to
statically control filesystem mounting through <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Additionally, automatically mounting filesystems permits easy introduction of
unknown devices, thereby facilitating malicious activity.</rationale>
              <fix id="service_autofs_disabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable">
SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" stop 'autofs.service'
"$SYSTEMCTL_EXEC" disable 'autofs.service'
# Disable socket activation if we have a unit file for it
"$SYSTEMCTL_EXEC" list-unit-files | grep -q '^autofs.socket\&gt;' &amp;&amp; "$SYSTEMCTL_EXEC" disable 'autofs.socket'
# The service may not be running because it has been started and failed,
# so let's reset the state so OVAL checks pass.
# Service should be 'inactive', not 'failed' after reboot though.
"$SYSTEMCTL_EXEC" reset-failed 'autofs.service'
</fix>
              <fix id="service_autofs_disabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="disable">- name: Disable service autofs
  service:
    name: autofs
    enabled: 'no'
    state: stopped
  register: service_result
  failed_when: service_result is failed and ('Could not find the requested service'
    not in service_result.msg)
  tags:
    - service_autofs_disabled
    - medium_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-19(a)
    - NIST-800-53-AC-19(d)
    - NIST-800-53-AC-19(e)
    - NIST-800-53-IA-3
    - NIST-800-171-3.4.6
    - DISA-STIG-010590

- name: Disable socket of service autofs if applicable
  service:
    name: autofs.socket
    enabled: 'no'
    state: stopped
  register: socket_result
  failed_when: socket_result is failed and ('Could not find the requested service'
    not in socket_result.msg)
  tags:
    - service_autofs_disabled
    - medium_severity
    - disable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-AC-19(a)
    - NIST-800-53-AC-19(d)
    - NIST-800-53-AC-19(e)
    - NIST-800-53-IA-3
    - NIST-800-171-3.4.6
    - DISA-STIG-010590
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-service_autofs_disabled:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_partitions">
            <title xml:lang="en-US">Restrict Partition Mount Options</title>
            <description xml:lang="en-US">System partitions can be mounted with certain options
that limit what files on those partitions can do. These options
are set in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> configuration file, and can be
used to make certain types of malicious behavior more difficult.</description>
            <Value id="xccdf_org.ssgproject.content_value_var_removable_partition" type="string">
              <title xml:lang="en-US">Removable Partition</title>
              <description xml:lang="en-US">This value is used by the checks mount_option_nodev_removable_partitions, mount_option_nodev_removable_partitions,
and mount_option_nodev_removable_partitions to ensure that the correct mount options are set on partitions mounted from
removable media such as CD-ROMs, USB keys, and floppy drives. This value should be modified to reflect any removable
partitions that are required on the local system.</description>
              <value selector="dev_cdrom">/dev/cdrom</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="false" severity="medium">
              <title xml:lang="en-US">Add nodev Option to /dev/shm</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nodev</html:code> mount option can be used to prevent creation of device
files in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/shm</html:code>. Legitimate character and block devices should
not exist within temporary directories like <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/shm</html:code>.
Add the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nodev</html:code> option to the fourth column of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> for the line which controls mounting of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/shm</html:code>.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">The only legitimate location for device files is the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev</html:code> directory
located on the root partition. The only exception to this is chroot jails.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="mount_option_dev_shm_nodev" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_include_mount_options_functions" use="legacy"/>
include_mount_options_functions

function perform_remediation {
	# test "$mount_has_to_exist" = 'yes'
	if test "yes" = 'yes'; then
		assert_mount_point_in_fstab /dev/shm || { echo "Not remediating, because there is no record of /dev/shm in /etc/fstab" &gt;&amp;2; return 1; }
	fi

	ensure_mount_option_in_fstab "/dev/shm" "nodev" "" ""

	ensure_partition_is_mounted "/dev/shm"
}

perform_remediation
</fix>
              <fix id="mount_option_dev_shm_nodev" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="high" strategy="configure">- name: get back device associated to mountpoint
  shell: 'set -o pipefail

    mount | grep '' /dev/shm '' | cut -d '' '' -f 1

    '
  args:
    warn: false
    executable: /bin/bash
  register: device_name
  check_mode: false
  changed_when: false
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_dev_shm_nodev
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
- block:

    - name: get back device previous mount option
      shell: 'set -o pipefail

        mount | grep '' /dev/shm '' | sed -re ''s:.*\((.*)\):\1:''

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_cur_mountoption
      check_mode: false
      changed_when: false

    - name: get back device fstype
      shell: 'set -o pipefail

        mount | grep '' /dev/shm '' | cut -d '' '' -f 5

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_fstype
      check_mode: false
      changed_when: false

    - name: Ensure permission nodev are set on /dev/shm
      mount:
        path: /dev/shm
        src: '{{ device_name.stdout }}'
        opts: '{{ device_cur_mountoption.stdout }},nodev'
        state: mounted
        fstype: '{{ device_fstype.stdout }}'
  when:
    - (device_name.stdout | length &gt; 0)
    - ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_dev_shm_nodev
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_option_dev_shm_nodev:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="false" severity="medium">
              <title xml:lang="en-US">Add nosuid Option to /dev/shm</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> mount option can be used to prevent execution
of setuid programs in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/shm</html:code>.  The SUID and SGID permissions should not
be required in these world-writable directories.
Add the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> option to the fourth column of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> for the line which controls mounting of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/dev/shm</html:code>.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from temporary storage partitions.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="mount_option_dev_shm_nosuid" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_include_mount_options_functions" use="legacy"/>
include_mount_options_functions

function perform_remediation {
	# test "$mount_has_to_exist" = 'yes'
	if test "yes" = 'yes'; then
		assert_mount_point_in_fstab /dev/shm || { echo "Not remediating, because there is no record of /dev/shm in /etc/fstab" &gt;&amp;2; return 1; }
	fi

	ensure_mount_option_in_fstab "/dev/shm" "nosuid" "" ""

	ensure_partition_is_mounted "/dev/shm"
}

perform_remediation
</fix>
              <fix id="mount_option_dev_shm_nosuid" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="high" strategy="configure">- name: get back device associated to mountpoint
  shell: 'set -o pipefail

    mount | grep '' /dev/shm '' | cut -d '' '' -f 1

    '
  args:
    warn: false
    executable: /bin/bash
  register: device_name
  check_mode: false
  changed_when: false
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_dev_shm_nosuid
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
- block:

    - name: get back device previous mount option
      shell: 'set -o pipefail

        mount | grep '' /dev/shm '' | sed -re ''s:.*\((.*)\):\1:''

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_cur_mountoption
      check_mode: false
      changed_when: false

    - name: get back device fstype
      shell: 'set -o pipefail

        mount | grep '' /dev/shm '' | cut -d '' '' -f 5

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_fstype
      check_mode: false
      changed_when: false

    - name: Ensure permission nosuid are set on /dev/shm
      mount:
        path: /dev/shm
        src: '{{ device_name.stdout }}'
        opts: '{{ device_cur_mountoption.stdout }},nosuid'
        state: mounted
        fstype: '{{ device_fstype.stdout }}'
  when:
    - (device_name.stdout | length &gt; 0)
    - ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_dev_shm_nosuid
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_option_dev_shm_nosuid:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_home_nosuid" selected="false" severity="unknown">
              <title xml:lang="en-US">Add nosuid Option to /home</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> mount option can be used to prevent
execution of setuid programs in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code>. The SUID and SGID permissions
should not be required in these user data directories.
Add the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> option to the fourth column of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> for the line which controls mounting of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code>.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from user home directory partitions.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="mount_option_home_nosuid" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_include_mount_options_functions" use="legacy"/>
include_mount_options_functions

function perform_remediation {
	# test "$mount_has_to_exist" = 'yes'
	if test "yes" = 'yes'; then
		assert_mount_point_in_fstab /home || { echo "Not remediating, because there is no record of /home in /etc/fstab" &gt;&amp;2; return 1; }
	fi

	ensure_mount_option_in_fstab "/home" "nosuid" "" ""

	ensure_partition_is_mounted "/home"
}

perform_remediation
</fix>
              <fix id="mount_option_home_nosuid" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="high" strategy="configure">- name: get back device associated to mountpoint
  shell: 'set -o pipefail

    mount | grep '' /home '' | cut -d '' '' -f 1

    '
  args:
    warn: false
    executable: /bin/bash
  register: device_name
  check_mode: false
  changed_when: false
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_home_nosuid
    - unknown_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
- block:

    - name: get back device previous mount option
      shell: 'set -o pipefail

        mount | grep '' /home '' | sed -re ''s:.*\((.*)\):\1:''

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_cur_mountoption
      check_mode: false
      changed_when: false

    - name: get back device fstype
      shell: 'set -o pipefail

        mount | grep '' /home '' | cut -d '' '' -f 5

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_fstype
      check_mode: false
      changed_when: false

    - name: Ensure permission nosuid are set on /home
      mount:
        path: /home
        src: '{{ device_name.stdout }}'
        opts: '{{ device_cur_mountoption.stdout }},nosuid'
        state: mounted
        fstype: '{{ device_fstype.stdout }}'
  when:
    - (device_name.stdout | length &gt; 0)
    - ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_home_nosuid
    - unknown_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_option_home_nosuid:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="false" severity="medium">
              <version>SLES-12-010800</version>
              <title xml:lang="en-US">Add nosuid Option to Removable Media Partitions</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> mount option prevents set-user-identifier (SUID)
and set-group-identifier (SGID) permissions from taking effect. These permissions
allow users to execute binaries with the same permissions as the owner and group
of the file respectively. Users should not be allowed to introduce SUID and SGID
files into the system via partitions mounted from removeable media.
Add the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> option to the fourth column of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> for the line which controls mounting of

    any removable media partitions.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010800</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91933r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.19</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.3.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-2</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Allowing
users to introduce SUID or SGID binaries from partitions mounted off of
removable media would allow them to introduce their own highly-privileged programs.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="mount_option_nosuid_removable_partitions" system="urn:xccdf:fix:script:sh">
var_removable_partition="<sub idref="xccdf_org.ssgproject.content_value_var_removable_partition" use="legacy"/>"
<sub idref="xccdf_org.ssgproject.content_value_function_include_mount_options_functions" use="legacy"/>
include_mount_options_functions

function perform_remediation {
	# test "$mount_has_to_exist" = 'yes'
	if test "yes" = 'yes'; then
		assert_mount_point_in_fstab "$var_removable_partition" || { echo "Not remediating, because there is no record of $var_removable_partition in /etc/fstab" &gt;&amp;2; return 1; }
	fi

	ensure_mount_option_in_fstab "$var_removable_partition" "nosuid" "" ""

	ensure_partition_is_mounted "$var_removable_partition"
}

perform_remediation
</fix>
              <fix id="mount_option_nosuid_removable_partitions" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="high" strategy="configure">- name: XCCDF Value var_removable_partition # promote to variable
  set_fact:
    var_removable_partition: !!str <sub idref="xccdf_org.ssgproject.content_value_var_removable_partition" use="legacy"/>
  tags:
    - always

- name: get back device associated to mountpoint
  shell: 'set -o pipefail

    mount | grep '' {{ var_removable_partition }} '' | cut -d '' '' -f 1

    '
  args:
    warn: false
    executable: /bin/bash
  register: device_name
  check_mode: false
  changed_when: false
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_nosuid_removable_partitions
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-53-AC-19(a)
    - NIST-800-53-AC-19(d)
    - NIST-800-53-AC-19(e)
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
    - DISA-STIG-010800
- block:

    - name: get back device previous mount option
      shell: 'set -o pipefail

        mount | grep '' {{ var_removable_partition }} '' | sed -re ''s:.*\((.*)\):\1:''

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_cur_mountoption
      check_mode: false
      changed_when: false

    - name: get back device fstype
      shell: 'set -o pipefail

        mount | grep '' {{ var_removable_partition }} '' | cut -d '' '' -f 5

        '
      args:
        warn: false
        executable: /bin/bash
      register: device_fstype
      check_mode: false
      changed_when: false

    - name: Ensure permission nosuid are set on var_removable_partition
      mount:
        path: '{{ var_removable_partition }}'
        src: '{{ device_name.stdout }}'
        opts: '{{ device_cur_mountoption.stdout }},nosuid'
        state: mounted
        fstype: '{{ device_fstype.stdout }}'
  when:
    - (device_name.stdout | length &gt; 0)
    - ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - mount_option_nosuid_removable_partitions
    - medium_severity
    - configure_strategy
    - low_complexity
    - high_disruption
    - no_reboot_needed
    - NIST-800-53-AC-6
    - NIST-800-53-AC-19(a)
    - NIST-800-53-AC-19(d)
    - NIST-800-53-AC-19(e)
    - NIST-800-53-CM-7
    - NIST-800-53-MP-2
    - DISA-STIG-010800
</fix>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_nfs_nosuid" selected="false" severity="medium">
              <version>SLES-12-010810</version>
              <title xml:lang="en-US">Add nosuid Option to any nfs mounts</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> mount option can be used to prevent
execution of setuid programs in network mounts. The SUID and SGID permissions
should not be required in these user data directories.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010810</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91937r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled.
This option must be used for mounting any file system not containing
approved <html:code xmlns:html="http://www.w3.org/1999/xhtml">setuid</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">setguid</html:code> files. Executing files from
untrusted file systems increases the opportunity for unprivileged users to
attain unauthorized administrative access.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_option_nfs_nosuid:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_option_nfs_noexec" selected="false" severity="medium">
              <version>SLES-12-010820</version>
              <title xml:lang="en-US">Add noexec Option to any nfs mounts</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">noexec</html:code> mount option can be used to prevent
execution of programs in mounted file systems. This option must be used for
mounting any file system not containing approved binary files as they may
be incompatible.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010820</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91947r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <rationale xml:lang="en-US">Executing files from untrusted file systems increases the opportunity for
unprivileged users to attain unauthorized administrative access.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_option_nfs_noexec:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_mount_home_directories_nosuid" selected="false" severity="medium">
              <version>SLES-12-010790</version>
              <title xml:lang="en-US">Add nosuid Option to home directories</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> mount option can be used to prevent
execution of setuid programs in home directories. The SUID and SGID permissions
should not be required in these user data directories.

Assuming home directories in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code>, Add the <html:code xmlns:html="http://www.w3.org/1999/xhtml">nosuid</html:code> option to the fourth column of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/fstab</html:code> for the line which controls mounting of
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code>.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010790</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91925r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from user home directory partitions.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-mount_home_directories_nosuid:def:1" href="ssg-sle12-oval.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_restrictions">
            <title xml:lang="en-US">Restrict Programs from Dangerous Execution Patterns</title>
            <description xml:lang="en-US">The recommendations in this section are designed to
ensure that the system's features to protect against potentially
dangerous program execution are activated.
These protections are applied at the system initialization or
kernel level, and defend against certain types of badly-configured
or compromised programs.</description>
            <Group id="xccdf_org.ssgproject.content_group_coredumps">
              <title xml:lang="en-US">Disable Core Dumps</title>
              <description xml:lang="en-US">A core dump file is the memory image of an executable
program when it was terminated by the operating system due to
errant behavior. In most cases, only software developers
legitimately need to access these files. The core dump files may
also contain sensitive information, or unnecessarily occupy large
amounts of disk space.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Once a hard limit is set in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/security/limits.conf</html:code>, a
user cannot increase that limit within his or her own session. If access
to core dumps is required, consider restricting them to only
certain users or groups. See the <html:code xmlns:html="http://www.w3.org/1999/xhtml">limits.conf</html:code> man page for more
information.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The core dumps of setuid programs are further protected. The
<html:code xmlns:html="http://www.w3.org/1999/xhtml">sysctl</html:code> variable <html:code xmlns:html="http://www.w3.org/1999/xhtml">fs.suid_dumpable</html:code> controls whether
the kernel allows core dumps from these programs at all. The default
value of 0 is recommended.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="false" severity="medium">
                <title xml:lang="en-US">Disable Core Dumps for SUID programs</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">fs.suid_dumpable</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w fs.suid_dumpable=0</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">fs.suid_dumpable = 0</html:pre></description>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.5.1</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</reference>
                <rationale xml:lang="en-US">The core dump of a setuid program is more likely to contain
sensitive data, as the program itself runs with greater privileges than the
user who initiated execution of the program.  Disabling the ability for any
setuid program to write a core file decreases the risk of unauthorized access
of such data.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_fs_suid_dumpable" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for fs.suid_dumpable
#
/sbin/sysctl -q -n -w fs.suid_dumpable=0

#
# If fs.suid_dumpable present in /etc/sysctl.conf, change value to "0"
#	else, add "fs.suid_dumpable = 0" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^fs.suid_dumpable' "0" ''
</fix>
                <fix id="sysctl_fs_suid_dumpable" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl fs.suid_dumpable is set to 0
  sysctl:
    name: fs.suid_dumpable
    value: 0
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_fs_suid_dumpable
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-SI-11
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_fs_suid_dumpable:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_daemon_umask">
              <title xml:lang="en-US">Daemon Umask</title>
              <description xml:lang="en-US">The umask is a per-process setting which limits
the default permissions for creation of new files and directories.
The system includes initialization scripts which set the default umask
for system daemons.</description>
              <Value id="xccdf_org.ssgproject.content_value_var_umask_for_daemons" type="string">
                <title xml:lang="en-US">daemon umask</title>
                <description xml:lang="en-US">Enter umask for daemons</description>
                <value selector="022">022</value>
                <value selector="027">027</value>
                <value>022</value>
              </Value>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_enable_execshield_settings">
              <title xml:lang="en-US">Enable ExecShield</title>
              <description xml:lang="en-US">ExecShield describes kernel features that provide
protection against exploitation of memory corruption errors such as buffer
overflows. These features include random placement of the stack and other
memory regions, prevention of execution in memory that should only hold data,
and special handling of text buffers. These protections are enabled by default
on 32-bit systems and controlled through <html:code xmlns:html="http://www.w3.org/1999/xhtml">sysctl</html:code> variables 
<html:code xmlns:html="http://www.w3.org/1999/xhtml">kernel.exec-shield</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">kernel.randomize_va_space</html:code>. On the latest
64-bit systems, <html:code xmlns:html="http://www.w3.org/1999/xhtml">kernel.exec-shield</html:code> cannot be enabled or disabled with 
<html:code xmlns:html="http://www.w3.org/1999/xhtml">sysctl</html:code>.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_kptr_restrict" selected="false" severity="medium">
                <version>SLES-12-030320</version>
                <title xml:lang="en-US">Restrict Exposed Kernel Pointer Addresses Access</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">kernel.kptr_restrict</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w kernel.kptr_restrict=1</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">kernel.kptr_restrict = 1</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-16</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030320</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92175r2_rule</reference>
                <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R23)</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002824</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-39</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000433-GPOS-00192</reference>
                <rationale xml:lang="en-US">Exposing kernel pointers (through procfs or <html:code xmlns:html="http://www.w3.org/1999/xhtml">seq_printf()</html:code>) exposes
the addresses of the kernel code and data.  If a write vulnerability occurs
in the kernel allowing a write access to a structure containing a function
pointer, the kernel can be compromised. This option disallows any program
without the CAP_SYSLOG capability from getting kernel pointer addresses,
replacing them with 0.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_kernel_kptr_restrict" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for kernel.kptr_restrict
#
/sbin/sysctl -q -n -w kernel.kptr_restrict=1

#
# If kernel.kptr_restrict present in /etc/sysctl.conf, change value to "1"
#	else, add "kernel.kptr_restrict = 1" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^kernel.kptr_restrict' "1" ''
</fix>
                <fix id="sysctl_kernel_kptr_restrict" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl kernel.kptr_restrict is set to 1
  sysctl:
    name: kernel.kptr_restrict
    value: 1
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_kernel_kptr_restrict
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-SC-39
    - DISA-STIG-030320
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_kernel_kptr_restrict:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_kernel_kptr_restrict_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="false" severity="medium">
                <version>SLES-12-030330</version>
                <title xml:lang="en-US">Enable Randomized Layout of Virtual Address Space</title>
                <description xml:lang="en-US">To set the runtime status of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">kernel.randomize_va_space</html:code> kernel parameter, run the following command: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo sysctl -w kernel.randomize_va_space=2</html:pre>
If this is not the system default value, add the following line to a file in the directory <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysctl.d</html:code>: <html:pre xmlns:html="http://www.w3.org/1999/xhtml">kernel.randomize_va_space = 2</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002824</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-16</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000433-GPOS-00193</reference>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-030330</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92177r1_rule</reference>
                <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.5.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.7</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(3)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(4)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(b)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(c)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)</reference>
                <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-30(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-39</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">Address space layout randomization (ASLR) makes it more difficult for an
attacker to predict the location of attack code they have introduced into a
process's address space during an attempt at exploitation.  Additionally,
ASLR makes it more difficult for an attacker to know the location of
existing code in order to re-purpose it using return oriented programming
(ROP) techniques.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="sysctl_kernel_randomize_va_space" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="medium" strategy="disable">

#
# Set runtime for kernel.randomize_va_space
#
/sbin/sysctl -q -n -w kernel.randomize_va_space=2

#
# If kernel.randomize_va_space present in /etc/sysctl.conf, change value to "2"
#	else, add "kernel.randomize_va_space = 2" to /etc/sysctl.conf
#
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/sysctl.conf' '^kernel.randomize_va_space' "2" ''
</fix>
                <fix id="sysctl_kernel_randomize_va_space" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="medium" strategy="disable">- name: Ensure sysctl kernel.randomize_va_space is set to 2
  sysctl:
    name: kernel.randomize_va_space
    value: 2
    state: present
    reload: true
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - sysctl_kernel_randomize_va_space
    - medium_severity
    - disable_strategy
    - low_complexity
    - medium_disruption
    - reboot_required
    - NIST-800-53-SC-30(2)
    - NIST-800-53-SC-39
    - NIST-800-171-3.1.7
    - DISA-STIG-030330
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_kernel_randomize_va_space:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_enable_nx">
              <title xml:lang="en-US">Enable Execute Disable (XD) or No Execute (NX) Support on
x86 Systems</title>
              <description xml:lang="en-US">Recent processors in the x86 family support the
ability to prevent code execution on a per memory page basis.
Generically and on AMD processors, this ability is called No
Execute (NX), while on Intel processors it is called Execute
Disable (XD). This ability can help prevent exploitation of buffer
overflow vulnerabilities and should be activated whenever possible.
Extra steps must be taken to ensure that this protection is
enabled, particularly on 32-bit x86 systems. Other processors, such
as Itanium and POWER, have included such support since inception
and the standard kernel for those platforms supports the
feature. This is enabled by default on the latest Red Hat and 
Fedora systems if supported by the hardware.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_poisoning">
              <title xml:lang="en-US">Memory Poisoning</title>
              <description xml:lang="en-US">Memory Poisoning consists of writing a special value to uninitialized or freed memory.
Poisoning can be used as a mechanism to prevent leak of information and detection of
corrupted memory.</description>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_permissions_local">
            <title xml:lang="en-US">Verify Permissions on Important Files and
Directories Are Configured in /etc/permissions.local</title>
            <description xml:lang="en-US">Permissions for many files on a system must be set
restrictively to ensure sensitive information is properly protected.
This section discusses the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/permissions.local</html:code> file, where
expected permissions can be configured to be checked and fixed through
usage of the <html:code xmlns:html="http://www.w3.org/1999/xhtml">chkstat</html:code> command.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_file_permissions_var_log_messages" selected="false" severity="medium">
              <version>SLES-12-010890</version>
              <title xml:lang="en-US">Verify that local /var/log/messages is not world-readable</title>
              <description xml:lang="en-US">Files containing sensitive informations should be protected by restrictive
permissions. Most of the time, there is no need that these files need to be read by any non-root user

To properly set the permissions of <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/messages</html:code>, run the command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo chmod 0640 /var/log/messages</html:pre>

Check that "permissions.local" file contains the correct permissions rules with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep -i messages /etc/permissions.local

/var/log/messages root:root 640</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010890</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91971r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001314</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11(c)</reference>
              <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/messages</html:code> file contains system error messages. Only
authorized personnel should be aware of errors and the details of the
errors. Error messages are an indicator of an organization's operational
state or can identify the SUSE operating system or platform. Additionally,
Personally Identifiable Information (PII) and operational information must
not be revealed through error messages to unauthorized personnel or their
designated representatives.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-file_permissions_var_log_messages:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-file_permissions_var_log_messages_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_permissions_local_var_log_audit" selected="false" severity="medium">
              <version>SLES-12-020120</version>
              <title xml:lang="en-US">Verify that Local Logs of the audit Daemon are not World-Readable</title>
              <description xml:lang="en-US">Files containing sensitive informations should be protected by restrictive
permissions. Most of the time, there is no need that these files need to be read by any non-root user.

Check that "permissions.local" file contains the correct permissions rules with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># grep -i audit /etc/permissions.local

/var/log/audit/ root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020120</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92007r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000162</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000163</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000164</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <rationale xml:lang="en-US">Without the capability to restrict which roles and individuals can select
which events are audited, unauthorized personnel may be able to prevent the
auditing of critical events. Misconfigured audits may degrade the system's
performance by overwhelming the audit log. Misconfigured audits may also
make it more difficult to establish, correlate, and investigate the events
relating to an incident or identify those responsible for one.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-permissions_local_var_log_audit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_permissions_local_audit_binaries" selected="false" severity="medium">
              <version>SLES-12-020130</version>
              <title xml:lang="en-US">Verify Permissions of Local Logs of audit Tools</title>
              <description xml:lang="en-US">The SUSE operating system audit tools must have the proper permissions
configured to protect against unauthorized access.

Check that "permissions.local" file contains the correct permissions rules
with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">grep "^/usr/sbin/au" /etc/permissions.local

/usr/sbin/audispd root:root 0750
/usr/sbin/auditctl root:root 0750
/usr/sbin/auditd root:root 0750
/usr/sbin/ausearch root:root 0755
/usr/sbin/aureport root:root 0755
/usr/sbin/autrace root:root 0750
/usr/sbin/augenrules root:root 0750
</html:pre>

Audit tools include but are not limited to vendor-provided and open-source
audit tools needed to successfully view and manipulate audit information
system activity and records. Audit tools include custom queries and report
generators.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-020130</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-92009r2_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001493</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001494</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001495</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <rationale xml:lang="en-US">Protecting audit information also includes identifying and protecting the
tools used to view and manipulate log data. Therefore, protecting audit
tools is necessary to prevent unauthorized operation on audit information.

SUSE operating systems providing tools to interface with audit information
will leverage user permissions and roles identifying the user accessing the
tools and the corresponding rights the user enjoys to make access decisions
regarding the access to audit tools.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-permissions_local_audit_binaries_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_run_chkstat" selected="false" severity="medium">
              <version>SLES-12-010880</version>
              <title xml:lang="en-US">OS commands and libraries must have the proper permissions to protect from unauthorized access</title>
              <description xml:lang="en-US">Verify that the SUSE operating system prevents unauthorized users from
accessing system command and library files.

Check that all of the audit information files and folders have the correct
permissions with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo chkstat --warn --system</html:pre>

Set the correct permissions with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># sudo chkstat --set --system</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010880</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91969r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001499</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-5(6)</reference>
              <rationale xml:lang="en-US">If the SUSE operating system were to allow any user to make changes to
software libraries, those changes might be implemented without undergoing
the appropriate testing and approvals that are part of a robust change
management process.

This requirement applies to SUSE operating systems with software libraries
that are accessible and configurable, as in the case of interpreted
languages. Software libraries also include privileged programs that execute
with escalated privileges. Only qualified and authorized individuals must
be allowed to obtain access to information system components to initiate
changes, including upgrades and modifications.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-run_chkstat_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_selinux">
          <title xml:lang="en-US">SELinux</title>
          <description xml:lang="en-US">SELinux is a feature of the Linux kernel which can be
used to guard against misconfigured or compromised programs.
SELinux enforces the idea that programs should be limited in what
files they can access and what actions they can take.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The default SELinux policy, as configured on SUSE Linux Enterprise 12, has been
sufficiently developed and debugged that it should be usable on
almost any system with minimal configuration and a small
amount of system administrator training. This policy prevents
system services - including most of the common network-visible
services such as mail servers, FTP servers, and DNS servers - from
accessing files which those services have no valid reason to
access. This action alone prevents a huge amount of possible damage
from network attacks against services, from trojaned software, and
so forth.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
This guide recommends that SELinux be enabled using the
default (targeted) policy on every SUSE Linux Enterprise 12 system, unless that
system has unusual requirements which make a stronger policy
appropriate.</description>
          <Value id="xccdf_org.ssgproject.content_value_var_selinux_policy_name" type="string">
            <title xml:lang="en-US">SELinux policy</title>
            <description xml:lang="en-US">Type of policy in use. Possible values are:
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>targeted - Only targeted network daemons are protected.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>strict - Full SELinux protection.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>mls - Multiple levels of security</description>
            <value>targeted</value>
            <value selector="mls">mls</value>
            <value selector="targeted">targeted</value>
          </Value>
          <Value id="xccdf_org.ssgproject.content_value_var_selinux_state" type="string">
            <title xml:lang="en-US">SELinux state</title>
            <description xml:lang="en-US">enforcing - SELinux security policy is enforced.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>permissive - SELinux prints warnings instead of enforcing.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>disabled - SELinux is fully disabled.</description>
            <value>enforcing</value>
            <value selector="disabled">disabled</value>
            <value selector="enforcing">enforcing</value>
            <value selector="permissive">permissive</value>
          </Value>
          <Group id="xccdf_org.ssgproject.content_group_selinux-booleans">
            <title xml:lang="en-US">SELinux - Booleans</title>
            <description xml:lang="en-US">Enable or Disable runtime customization of SELinux system policies
without having to reload or recompile the SELinux policy.</description>
            <Value id="xccdf_org.ssgproject.content_value_var_abrt_anon_write" type="boolean">
              <title xml:lang="en-US">abrt_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_abrt_handle_event" type="boolean">
              <title xml:lang="en-US">abrt_handle_event SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_abrt_upload_watch_anon_write" type="boolean">
              <title xml:lang="en-US">abrt_upload_watch_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_antivirus_can_scan_system" type="boolean">
              <title xml:lang="en-US">antivirus_can_scan_system SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_antivirus_use_jit" type="boolean">
              <title xml:lang="en-US">antivirus_use_jit SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_auditadm_exec_content" type="boolean">
              <title xml:lang="en-US">auditadm_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_authlogin_nsswitch_use_ldap" type="boolean">
              <title xml:lang="en-US">authlogin_nsswitch_use_ldap SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_authlogin_radius" type="boolean">
              <title xml:lang="en-US">authlogin_radius SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_authlogin_yubikey" type="boolean">
              <title xml:lang="en-US">authlogin_yubikey SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_awstats_purge_apache_log_files" type="boolean">
              <title xml:lang="en-US">awstats_purge_apache_log_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_boinc_execmem" type="boolean">
              <title xml:lang="en-US">boinc_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cdrecord_read_content" type="boolean">
              <title xml:lang="en-US">cdrecord_read_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cluster_can_network_connect" type="boolean">
              <title xml:lang="en-US">cluster_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cluster_manage_all_files" type="boolean">
              <title xml:lang="en-US">cluster_manage_all_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cluster_use_execmem" type="boolean">
              <title xml:lang="en-US">cluster_use_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cobbler_anon_write" type="boolean">
              <title xml:lang="en-US">cobbler_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cobbler_can_network_connect" type="boolean">
              <title xml:lang="en-US">cobbler_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cobbler_use_cifs" type="boolean">
              <title xml:lang="en-US">cobbler_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cobbler_use_nfs" type="boolean">
              <title xml:lang="en-US">cobbler_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_collectd_tcp_network_connect" type="boolean">
              <title xml:lang="en-US">collectd_tcp_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_condor_tcp_network_connect" type="boolean">
              <title xml:lang="en-US">condor_tcp_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_conman_can_network" type="boolean">
              <title xml:lang="en-US">conman_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cron_can_relabel" type="boolean">
              <title xml:lang="en-US">cron_can_relabel SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cron_system_cronjob_use_shares" type="boolean">
              <title xml:lang="en-US">cron_system_cronjob_use_shares SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cron_userdomain_transition" type="boolean">
              <title xml:lang="en-US">cron_userdomain_transition SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cups_execmem" type="boolean">
              <title xml:lang="en-US">cups_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_cvs_read_shadow" type="boolean">
              <title xml:lang="en-US">cvs_read_shadow SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_daemons_dump_core" type="boolean">
              <title xml:lang="en-US">daemons_dump_core SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_daemons_enable_cluster_mode" type="boolean">
              <title xml:lang="en-US">daemons_enable_cluster_mode SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_daemons_use_tcp_wrapper" type="boolean">
              <title xml:lang="en-US">daemons_use_tcp_wrapper SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_daemons_use_tty" type="boolean">
              <title xml:lang="en-US">daemons_use_tty SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_dbadm_exec_content" type="boolean">
              <title xml:lang="en-US">dbadm_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_dbadm_manage_user_files" type="boolean">
              <title xml:lang="en-US">dbadm_manage_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_dbadm_read_user_files" type="boolean">
              <title xml:lang="en-US">dbadm_read_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_deny_execmem" type="boolean">
              <title xml:lang="en-US">deny_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_deny_ptrace" type="boolean">
              <title xml:lang="en-US">deny_ptrace SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_dhcpc_exec_iptables" type="boolean">
              <title xml:lang="en-US">dhcpc_exec_iptables SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_dhcpd_use_ldap" type="boolean">
              <title xml:lang="en-US">dhcpd_use_ldap SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_container_connect_any" type="boolean">
              <title xml:lang="en-US">container_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_domain_fd_use" type="boolean">
              <title xml:lang="en-US">domain_fd_use SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_domain_kernel_load_modules" type="boolean">
              <title xml:lang="en-US">domain_kernel_load_modules SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_entropyd_use_audio" type="boolean">
              <title xml:lang="en-US">entropyd_use_audio SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_exim_can_connect_db" type="boolean">
              <title xml:lang="en-US">exim_can_connect_db SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_exim_manage_user_files" type="boolean">
              <title xml:lang="en-US">exim_manage_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_exim_read_user_files" type="boolean">
              <title xml:lang="en-US">exim_read_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_fcron_crond" type="boolean">
              <title xml:lang="en-US">fcron_crond SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_fenced_can_network_connect" type="boolean">
              <title xml:lang="en-US">fenced_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_fenced_can_ssh" type="boolean">
              <title xml:lang="en-US">fenced_can_ssh SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_fips_mode" type="boolean">
              <title xml:lang="en-US">fips_mode SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_anon_write" type="boolean">
              <title xml:lang="en-US">ftpd_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_connect_all_unreserved" type="boolean">
              <title xml:lang="en-US">ftpd_connect_all_unreserved SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_connect_db" type="boolean">
              <title xml:lang="en-US">ftpd_connect_db SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_full_access" type="boolean">
              <title xml:lang="en-US">ftpd_full_access SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_use_cifs" type="boolean">
              <title xml:lang="en-US">ftpd_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_use_fusefs" type="boolean">
              <title xml:lang="en-US">ftpd_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_use_nfs" type="boolean">
              <title xml:lang="en-US">ftpd_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ftpd_use_passive_mode" type="boolean">
              <title xml:lang="en-US">ftpd_use_passive_mode SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_cgi_enable_homedirs" type="boolean">
              <title xml:lang="en-US">git_cgi_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_cgi_use_cifs" type="boolean">
              <title xml:lang="en-US">git_cgi_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_cgi_use_nfs" type="boolean">
              <title xml:lang="en-US">git_cgi_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_session_bind_all_unreserved_ports" type="boolean">
              <title xml:lang="en-US">git_session_bind_all_unreserved_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_session_users" type="boolean">
              <title xml:lang="en-US">git_session_users SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_system_enable_homedirs" type="boolean">
              <title xml:lang="en-US">git_system_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_system_use_cifs" type="boolean">
              <title xml:lang="en-US">git_system_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_git_system_use_nfs" type="boolean">
              <title xml:lang="en-US">git_system_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gitosis_can_sendmail" type="boolean">
              <title xml:lang="en-US">gitosis_can_sendmail SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_glance_api_can_network" type="boolean">
              <title xml:lang="en-US">glance_api_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_glance_use_execmem" type="boolean">
              <title xml:lang="en-US">glance_use_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_glance_use_fusefs" type="boolean">
              <title xml:lang="en-US">glance_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_global_ssp" type="boolean">
              <title xml:lang="en-US">global_ssp SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gluster_anon_write" type="boolean">
              <title xml:lang="en-US">gluster_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gluster_export_all_ro" type="boolean">
              <title xml:lang="en-US">gluster_export_all_ro SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gluster_export_all_rw" type="boolean">
              <title xml:lang="en-US">gluster_export_all_rw SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gpg_web_anon_write" type="boolean">
              <title xml:lang="en-US">gpg_web_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_gssd_read_tmp" type="boolean">
              <title xml:lang="en-US">gssd_read_tmp SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_guest_exec_content" type="boolean">
              <title xml:lang="en-US">guest_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_haproxy_connect_any" type="boolean">
              <title xml:lang="en-US">haproxy_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_anon_write" type="boolean">
              <title xml:lang="en-US">httpd_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_builtin_scripting" type="boolean">
              <title xml:lang="en-US">httpd_builtin_scripting SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_check_spam" type="boolean">
              <title xml:lang="en-US">httpd_can_check_spam SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_connect_ftp" type="boolean">
              <title xml:lang="en-US">httpd_can_connect_ftp SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_connect_ldap" type="boolean">
              <title xml:lang="en-US">httpd_can_connect_ldap SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_connect_mythtv" type="boolean">
              <title xml:lang="en-US">httpd_can_connect_mythtv SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_connect_zabbix" type="boolean">
              <title xml:lang="en-US">httpd_can_connect_zabbix SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_network_connect" type="boolean">
              <title xml:lang="en-US">httpd_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_network_connect_cobbler" type="boolean">
              <title xml:lang="en-US">httpd_can_network_connect_cobbler SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_network_connect_db" type="boolean">
              <title xml:lang="en-US">httpd_can_network_connect_db SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_network_memcache" type="boolean">
              <title xml:lang="en-US">httpd_can_network_memcache SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_network_relay" type="boolean">
              <title xml:lang="en-US">httpd_can_network_relay SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_can_sendmail" type="boolean">
              <title xml:lang="en-US">httpd_can_sendmail SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_dbus_avahi" type="boolean">
              <title xml:lang="en-US">httpd_dbus_avahi SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_dbus_sssd" type="boolean">
              <title xml:lang="en-US">httpd_dbus_sssd SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_dontaudit_search_dirs" type="boolean">
              <title xml:lang="en-US">httpd_dontaudit_search_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_enable_cgi" type="boolean">
              <title xml:lang="en-US">httpd_enable_cgi SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_enable_ftp_server" type="boolean">
              <title xml:lang="en-US">httpd_enable_ftp_server SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_enable_homedirs" type="boolean">
              <title xml:lang="en-US">httpd_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_execmem" type="boolean">
              <title xml:lang="en-US">httpd_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_graceful_shutdown" type="boolean">
              <title xml:lang="en-US">httpd_graceful_shutdown SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_manage_ipa" type="boolean">
              <title xml:lang="en-US">httpd_manage_ipa SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_mod_auth_ntlm_winbind" type="boolean">
              <title xml:lang="en-US">httpd_mod_auth_ntlm_winbind SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_mod_auth_pam" type="boolean">
              <title xml:lang="en-US">httpd_mod_auth_pam SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_read_user_content" type="boolean">
              <title xml:lang="en-US">httpd_read_user_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_run_ipa" type="boolean">
              <title xml:lang="en-US">httpd_run_ipa SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_run_preupgrade" type="boolean">
              <title xml:lang="en-US">httpd_run_preupgrade SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_run_stickshift" type="boolean">
              <title xml:lang="en-US">httpd_run_stickshift SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_serve_cobbler_files" type="boolean">
              <title xml:lang="en-US">httpd_serve_cobbler_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_setrlimit" type="boolean">
              <title xml:lang="en-US">httpd_setrlimit SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_ssi_exec" type="boolean">
              <title xml:lang="en-US">httpd_ssi_exec SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_sys_script_anon_write" type="boolean">
              <title xml:lang="en-US">httpd_sys_script_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_tmp_exec" type="boolean">
              <title xml:lang="en-US">httpd_tmp_exec SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_tty_comm" type="boolean">
              <title xml:lang="en-US">httpd_tty_comm SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_unified" type="boolean">
              <title xml:lang="en-US">httpd_unified SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_cifs" type="boolean">
              <title xml:lang="en-US">httpd_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_fusefs" type="boolean">
              <title xml:lang="en-US">httpd_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_gpg" type="boolean">
              <title xml:lang="en-US">httpd_use_gpg SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_nfs" type="boolean">
              <title xml:lang="en-US">httpd_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_openstack" type="boolean">
              <title xml:lang="en-US">httpd_use_openstack SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_use_sasl" type="boolean">
              <title xml:lang="en-US">httpd_use_sasl SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_httpd_verify_dns" type="boolean">
              <title xml:lang="en-US">httpd_verify_dns SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_icecast_use_any_tcp_ports" type="boolean">
              <title xml:lang="en-US">icecast_use_any_tcp_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_irc_use_any_tcp_ports" type="boolean">
              <title xml:lang="en-US">irc_use_any_tcp_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_irssi_use_full_network" type="boolean">
              <title xml:lang="en-US">irssi_use_full_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_kdumpgui_run_bootloader" type="boolean">
              <title xml:lang="en-US">kdumpgui_run_bootloader SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_kerberos_enabled" type="boolean">
              <title xml:lang="en-US">kerberos_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ksmtuned_use_cifs" type="boolean">
              <title xml:lang="en-US">ksmtuned_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ksmtuned_use_nfs" type="boolean">
              <title xml:lang="en-US">ksmtuned_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logadm_exec_content" type="boolean">
              <title xml:lang="en-US">logadm_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logging_syslogd_can_sendmail" type="boolean">
              <title xml:lang="en-US">logging_syslogd_can_sendmail SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logging_syslogd_run_nagios_plugins" type="boolean">
              <title xml:lang="en-US">logging_syslogd_run_nagios_plugins SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logging_syslogd_use_tty" type="boolean">
              <title xml:lang="en-US">logging_syslogd_use_tty SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_login_console_enabled" type="boolean">
              <title xml:lang="en-US">login_console_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logrotate_use_nfs" type="boolean">
              <title xml:lang="en-US">logrotate_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_logwatch_can_network_connect_mail" type="boolean">
              <title xml:lang="en-US">logwatch_can_network_connect_mail SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_lsmd_plugin_connect_any" type="boolean">
              <title xml:lang="en-US">lsmd_plugin_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mailman_use_fusefs" type="boolean">
              <title xml:lang="en-US">mailman_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mcelog_client" type="boolean">
              <title xml:lang="en-US">mcelog_client SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mcelog_exec_scripts" type="boolean">
              <title xml:lang="en-US">mcelog_exec_scripts SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mcelog_foreground" type="boolean">
              <title xml:lang="en-US">mcelog_foreground SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mcelog_server" type="boolean">
              <title xml:lang="en-US">mcelog_server SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_minidlna_read_generic_user_content" type="boolean">
              <title xml:lang="en-US">minidlna_read_generic_user_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mmap_low_allowed" type="boolean">
              <title xml:lang="en-US">mmap_low_allowed SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mock_enable_homedirs" type="boolean">
              <title xml:lang="en-US">mock_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mount_anyfile" type="boolean">
              <title xml:lang="en-US">mount_anyfile SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_plugin_bind_unreserved_ports" type="boolean">
              <title xml:lang="en-US">mozilla_plugin_bind_unreserved_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_plugin_can_network_connect" type="boolean">
              <title xml:lang="en-US">mozilla_plugin_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_plugin_use_bluejeans" type="boolean">
              <title xml:lang="en-US">mozilla_plugin_use_bluejeans SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_plugin_use_gps" type="boolean">
              <title xml:lang="en-US">mozilla_plugin_use_gps SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_plugin_use_spice" type="boolean">
              <title xml:lang="en-US">mozilla_plugin_use_spice SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mozilla_read_content" type="boolean">
              <title xml:lang="en-US">mozilla_read_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mpd_enable_homedirs" type="boolean">
              <title xml:lang="en-US">mpd_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mpd_use_cifs" type="boolean">
              <title xml:lang="en-US">mpd_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mpd_use_nfs" type="boolean">
              <title xml:lang="en-US">mpd_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mplayer_execstack" type="boolean">
              <title xml:lang="en-US">mplayer_execstack SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_mysql_connect_any" type="boolean">
              <title xml:lang="en-US">mysql_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nagios_run_pnp4nagios" type="boolean">
              <title xml:lang="en-US">nagios_run_pnp4nagios SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nagios_run_sudo" type="boolean">
              <title xml:lang="en-US">nagios_run_sudo SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_named_tcp_bind_http_port" type="boolean">
              <title xml:lang="en-US">named_tcp_bind_http_port SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_named_write_master_zones" type="boolean">
              <title xml:lang="en-US">named_write_master_zones SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_neutron_can_network" type="boolean">
              <title xml:lang="en-US">neutron_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nfs_export_all_ro" type="boolean">
              <title xml:lang="en-US">nfs_export_all_ro SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nfs_export_all_rw" type="boolean">
              <title xml:lang="en-US">nfs_export_all_rw SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nfsd_anon_write" type="boolean">
              <title xml:lang="en-US">nfsd_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nis_enabled" type="boolean">
              <title xml:lang="en-US">nis_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_nscd_use_shm" type="boolean">
              <title xml:lang="en-US">nscd_use_shm SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_openshift_use_nfs" type="boolean">
              <title xml:lang="en-US">openshift_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_openvpn_can_network_connect" type="boolean">
              <title xml:lang="en-US">openvpn_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_openvpn_enable_homedirs" type="boolean">
              <title xml:lang="en-US">openvpn_enable_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_openvpn_run_unconfined" type="boolean">
              <title xml:lang="en-US">openvpn_run_unconfined SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_pcp_bind_all_unreserved_ports" type="boolean">
              <title xml:lang="en-US">pcp_bind_all_unreserved_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_pcp_read_generic_logs" type="boolean">
              <title xml:lang="en-US">pcp_read_generic_logs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_piranha_lvs_can_network_connect" type="boolean">
              <title xml:lang="en-US">piranha_lvs_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polipo_connect_all_unreserved" type="boolean">
              <title xml:lang="en-US">polipo_connect_all_unreserved SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polipo_session_bind_all_unreserved_ports" type="boolean">
              <title xml:lang="en-US">polipo_session_bind_all_unreserved_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polipo_session_users" type="boolean">
              <title xml:lang="en-US">polipo_session_users SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polipo_use_cifs" type="boolean">
              <title xml:lang="en-US">polipo_use_cifs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polipo_use_nfs" type="boolean">
              <title xml:lang="en-US">polipo_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_polyinstantiation_enabled" type="boolean">
              <title xml:lang="en-US">polyinstantiation_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_postfix_local_write_mail_spool" type="boolean">
              <title xml:lang="en-US">postfix_local_write_mail_spool SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_postgresql_can_rsync" type="boolean">
              <title xml:lang="en-US">postgresql_can_rsync SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_postgresql_selinux_transmit_client_label" type="boolean">
              <title xml:lang="en-US">postgresql_selinux_transmit_client_label SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_postgresql_selinux_unconfined_dbadm" type="boolean">
              <title xml:lang="en-US">postgresql_selinux_unconfined_dbadm SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_postgresql_selinux_users_ddl" type="boolean">
              <title xml:lang="en-US">postgresql_selinux_users_ddl SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_pppd_can_insmod" type="boolean">
              <title xml:lang="en-US">pppd_can_insmod SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_pppd_for_user" type="boolean">
              <title xml:lang="en-US">pppd_for_user SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_privoxy_connect_any" type="boolean">
              <title xml:lang="en-US">privoxy_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_prosody_bind_http_port" type="boolean">
              <title xml:lang="en-US">prosody_bind_http_port SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_puppetagent_manage_all_files" type="boolean">
              <title xml:lang="en-US">puppetagent_manage_all_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_puppetmaster_use_db" type="boolean">
              <title xml:lang="en-US">puppetmaster_use_db SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_racoon_read_shadow" type="boolean">
              <title xml:lang="en-US">racoon_read_shadow SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_rsync_anon_write" type="boolean">
              <title xml:lang="en-US">rsync_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_rsync_client" type="boolean">
              <title xml:lang="en-US">rsync_client SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_rsync_export_all_ro" type="boolean">
              <title xml:lang="en-US">rsync_export_all_ro SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_rsync_full_access" type="boolean">
              <title xml:lang="en-US">rsync_full_access SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_create_home_dirs" type="boolean">
              <title xml:lang="en-US">samba_create_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_domain_controller" type="boolean">
              <title xml:lang="en-US">samba_domain_controller SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_enable_home_dirs" type="boolean">
              <title xml:lang="en-US">samba_enable_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_export_all_ro" type="boolean">
              <title xml:lang="en-US">samba_export_all_ro SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_export_all_rw" type="boolean">
              <title xml:lang="en-US">samba_export_all_rw SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_load_libgfapi" type="boolean">
              <title xml:lang="en-US">samba_load_libgfapi SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_portmapper" type="boolean">
              <title xml:lang="en-US">samba_portmapper SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_run_unconfined" type="boolean">
              <title xml:lang="en-US">samba_run_unconfined SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_share_fusefs" type="boolean">
              <title xml:lang="en-US">samba_share_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_samba_share_nfs" type="boolean">
              <title xml:lang="en-US">samba_share_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sanlock_use_fusefs" type="boolean">
              <title xml:lang="en-US">sanlock_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sanlock_use_nfs" type="boolean">
              <title xml:lang="en-US">sanlock_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sanlock_use_samba" type="boolean">
              <title xml:lang="en-US">sanlock_use_samba SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_saslauthd_read_shadow" type="boolean">
              <title xml:lang="en-US">saslauthd_read_shadow SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_secadm_exec_content" type="boolean">
              <title xml:lang="en-US">secadm_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_secure_mode" type="boolean">
              <title xml:lang="en-US">secure_mode SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_secure_mode_insmod" type="boolean">
              <title xml:lang="en-US">secure_mode_insmod SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_secure_mode_policyload" type="boolean">
              <title xml:lang="en-US">secure_mode_policyload SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_direct_dri_enabled" type="boolean">
              <title xml:lang="en-US">selinuxuser_direct_dri_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_execheap" type="boolean">
              <title xml:lang="en-US">selinuxuser_execheap SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_execmod" type="boolean">
              <title xml:lang="en-US">selinuxuser_execmod SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_execstack" type="boolean">
              <title xml:lang="en-US">selinuxuser_execstack SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_mysql_connect_enabled" type="boolean">
              <title xml:lang="en-US">selinuxuser_mysql_connect_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_ping" type="boolean">
              <title xml:lang="en-US">selinuxuser_ping SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_postgresql_connect_enabled" type="boolean">
              <title xml:lang="en-US">selinuxuser_postgresql_connect_enabled SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_rw_noexattrfile" type="boolean">
              <title xml:lang="en-US">selinuxuser_rw_noexattrfile SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_share_music" type="boolean">
              <title xml:lang="en-US">selinuxuser_share_music SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_tcp_server" type="boolean">
              <title xml:lang="en-US">selinuxuser_tcp_server SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_udp_server" type="boolean">
              <title xml:lang="en-US">selinuxuser_udp_server SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_selinuxuser_use_ssh_chroot" type="boolean">
              <title xml:lang="en-US">selinuxuser_use_ssh_chroot SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sge_domain_can_network_connect" type="boolean">
              <title xml:lang="en-US">sge_domain_can_network_connect SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sge_use_nfs" type="boolean">
              <title xml:lang="en-US">sge_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_smartmon_3ware" type="boolean">
              <title xml:lang="en-US">smartmon_3ware SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_smbd_anon_write" type="boolean">
              <title xml:lang="en-US">smbd_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_spamassassin_can_network" type="boolean">
              <title xml:lang="en-US">spamassassin_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_spamd_enable_home_dirs" type="boolean">
              <title xml:lang="en-US">spamd_enable_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_squid_connect_any" type="boolean">
              <title xml:lang="en-US">squid_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_squid_use_tproxy" type="boolean">
              <title xml:lang="en-US">squid_use_tproxy SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ssh_chroot_rw_homedirs" type="boolean">
              <title xml:lang="en-US">ssh_chroot_rw_homedirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ssh_keysign" type="boolean">
              <title xml:lang="en-US">ssh_keysign SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_ssh_sysadm_login" type="boolean">
              <title xml:lang="en-US">ssh_sysadm_login SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_staff_exec_content" type="boolean">
              <title xml:lang="en-US">staff_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_staff_use_svirt" type="boolean">
              <title xml:lang="en-US">staff_use_svirt SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_swift_can_network" type="boolean">
              <title xml:lang="en-US">swift_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_sysadm_exec_content" type="boolean">
              <title xml:lang="en-US">sysadm_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_telepathy_connect_all_ports" type="boolean">
              <title xml:lang="en-US">telepathy_connect_all_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_telepathy_tcp_connect_generic_network_ports" type="boolean">
              <title xml:lang="en-US">telepathy_tcp_connect_generic_network_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tftp_anon_write" type="boolean">
              <title xml:lang="en-US">tftp_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tftp_home_dir" type="boolean">
              <title xml:lang="en-US">tftp_home_dir SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tmpreaper_use_nfs" type="boolean">
              <title xml:lang="en-US">tmpreaper_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tmpreaper_use_samba" type="boolean">
              <title xml:lang="en-US">tmpreaper_use_samba SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tor_bind_all_unreserved_ports" type="boolean">
              <title xml:lang="en-US">tor_bind_all_unreserved_ports SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_tor_can_network_relay" type="boolean">
              <title xml:lang="en-US">tor_can_network_relay SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_unconfined_chrome_sandbox_transition" type="boolean">
              <title xml:lang="en-US">unconfined_chrome_sandbox_transition SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_unconfined_login" type="boolean">
              <title xml:lang="en-US">unconfined_login SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_unconfined_mozilla_plugin_transition" type="boolean">
              <title xml:lang="en-US">unconfined_mozilla_plugin_transition SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_unprivuser_use_svirt" type="boolean">
              <title xml:lang="en-US">unprivuser_use_svirt SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_use_ecryptfs_home_dirs" type="boolean">
              <title xml:lang="en-US">use_ecryptfs_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_use_fusefs_home_dirs" type="boolean">
              <title xml:lang="en-US">use_fusefs_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_use_lpd_server" type="boolean">
              <title xml:lang="en-US">use_lpd_server SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_use_nfs_home_dirs" type="boolean">
              <title xml:lang="en-US">use_nfs_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_use_samba_home_dirs" type="boolean">
              <title xml:lang="en-US">use_samba_home_dirs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_user_exec_content" type="boolean">
              <title xml:lang="en-US">user_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_varnishd_connect_any" type="boolean">
              <title xml:lang="en-US">varnishd_connect_any SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_read_qemu_ga_data" type="boolean">
              <title xml:lang="en-US">virt_read_qemu_ga_data SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_rw_qemu_ga_data" type="boolean">
              <title xml:lang="en-US">virt_rw_qemu_ga_data SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_sandbox_use_all_caps" type="boolean">
              <title xml:lang="en-US">virt_sandbox_use_all_caps SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_sandbox_use_audit" type="boolean">
              <title xml:lang="en-US">virt_sandbox_use_audit SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_sandbox_use_mknod" type="boolean">
              <title xml:lang="en-US">virt_sandbox_use_mknod SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_sandbox_use_netlink" type="boolean">
              <title xml:lang="en-US">virt_sandbox_use_netlink SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_sandbox_use_sys_admin" type="boolean">
              <title xml:lang="en-US">virt_sandbox_use_sys_admin SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_transition_userdomain" type="boolean">
              <title xml:lang="en-US">virt_transition_userdomain SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_comm" type="boolean">
              <title xml:lang="en-US">virt_use_comm SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_execmem" type="boolean">
              <title xml:lang="en-US">virt_use_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_fusefs" type="boolean">
              <title xml:lang="en-US">virt_use_fusefs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_nfs" type="boolean">
              <title xml:lang="en-US">virt_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_rawip" type="boolean">
              <title xml:lang="en-US">virt_use_rawip SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_samba" type="boolean">
              <title xml:lang="en-US">virt_use_samba SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_sanlock" type="boolean">
              <title xml:lang="en-US">virt_use_sanlock SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_usb" type="boolean">
              <title xml:lang="en-US">virt_use_usb SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_virt_use_xserver" type="boolean">
              <title xml:lang="en-US">virt_use_xserver SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_webadm_manage_user_files" type="boolean">
              <title xml:lang="en-US">webadm_manage_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_webadm_read_user_files" type="boolean">
              <title xml:lang="en-US">webadm_read_user_files SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_wine_mmap_zero_ignore" type="boolean">
              <title xml:lang="en-US">wine_mmap_zero_ignore SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xdm_bind_vnc_tcp_port" type="boolean">
              <title xml:lang="en-US">xdm_bind_vnc_tcp_port SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xdm_exec_bootloader" type="boolean">
              <title xml:lang="en-US">xdm_exec_bootloader SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xdm_sysadm_login" type="boolean">
              <title xml:lang="en-US">xdm_sysadm_login SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xdm_write_home" type="boolean">
              <title xml:lang="en-US">xdm_write_home SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xen_use_nfs" type="boolean">
              <title xml:lang="en-US">xen_use_nfs SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xend_run_blktap" type="boolean">
              <title xml:lang="en-US">xend_run_blktap SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xend_run_qemu" type="boolean">
              <title xml:lang="en-US">xend_run_qemu SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xguest_connect_network" type="boolean">
              <title xml:lang="en-US">xguest_connect_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xguest_exec_content" type="boolean">
              <title xml:lang="en-US">xguest_exec_content SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xguest_mount_media" type="boolean">
              <title xml:lang="en-US">xguest_mount_media SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xguest_use_bluetooth" type="boolean">
              <title xml:lang="en-US">xguest_use_bluetooth SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>true</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xserver_clients_write_xshm" type="boolean">
              <title xml:lang="en-US">xserver_clients_write_xshm SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xserver_execmem" type="boolean">
              <title xml:lang="en-US">xserver_execmem SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_xserver_object_manager" type="boolean">
              <title xml:lang="en-US">xserver_object_manager SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_zabbix_can_network" type="boolean">
              <title xml:lang="en-US">zabbix_can_network SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_zarafa_setrlimit" type="boolean">
              <title xml:lang="en-US">zarafa_setrlimit SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_zebra_write_config" type="boolean">
              <title xml:lang="en-US">zebra_write_config SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_zoneminder_anon_write" type="boolean">
              <title xml:lang="en-US">zoneminder_anon_write SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
            <Value id="xccdf_org.ssgproject.content_value_var_zoneminder_run_sudo" type="boolean">
              <title xml:lang="en-US">zoneminder_run_sudo SELinux Boolean</title>
              <description xml:lang="en-US">default - Default SELinux boolean setting.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>on - SELinux boolean is enabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>off - SELinux boolean is disabled.</description>
              <value>false</value>
              <value selector="off">false</value>
              <value selector="on">true</value>
            </Value>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_software">
          <title xml:lang="en-US">Installing and Maintaining Software</title>
          <description xml:lang="en-US">The following sections contain information on
security-relevant choices during the initial operating system
installation process and the setup of software
updates.</description>
          <Group id="xccdf_org.ssgproject.content_group_disk_partitioning">
            <title xml:lang="en-US">Disk Partitioning</title>
            <description xml:lang="en-US">To ensure separation and protection of data, there
are top-level system directories which should be placed on their
own physical partition or logical volume. The installer's default
partitioning scheme creates separate logical volumes for
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/</html:code>, <html:code xmlns:html="http://www.w3.org/1999/xhtml">/boot</html:code>, and <html:code xmlns:html="http://www.w3.org/1999/xhtml">swap</html:code>.
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>If starting with any of the default layouts, check the box to
\"Review and modify partitioning.\" This allows for the easy creation
of additional logical volumes inside the volume group already
created, though it may require making <html:code>/</html:code>'s logical volume smaller to
create space. In general, using logical volumes is preferable to
using partitions because they can be more easily adjusted
later.</html:li><html:li>If creating a custom layout, create the partitions mentioned in
the previous paragraph (which the installer will require anyway),
as well as separate ones described in the following sections.</html:li></html:ul>
If a system has already been installed, and the default
partitioning
scheme was used, it is possible but nontrivial to
modify it to create separate logical volumes for the directories
listed above. The Logical Volume Manager (LVM) makes this possible.
See the LVM HOWTO at 
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://tldp.org/HOWTO/LVM-HOWTO/">http://tldp.org/HOWTO/LVM-HOWTO/</html:a>
for more detailed information on LVM.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="false" severity="high">
              <version>SLES-12-010450</version>
              <title xml:lang="en-US">Encrypt Partitions</title>
              <description xml:lang="en-US">SUSE Linux Enterprise 12 natively supports partition encryption through the
Linux Unified Key Setup-on-disk-format (LUKS) technology. The easiest way to
encrypt a partition is during installation time.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For manual installations, select the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Encrypt</html:code> checkbox during
partition creation to encrypt the partition. When this
option is selected the system will prompt for a passphrase to use in
decrypting the partition. The passphrase will subsequently need to be entered manually
every time the system boots.

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Detailed information on encrypting partitions using LUKS or LUKS ciphers can be found on
the SUSE Linux Enterprise 12 Documentation web site:<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

    
    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://www.suse.com/documentation/sled-12/book_security/data/sec_security_cryptofs_y2.html">https://www.suse.com/documentation/sled-12/book_security/data/sec_security_cryptofs_y2.html</html:a></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010450</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91843r3_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI02.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.16</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001199</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002475</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002476</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(b)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.310(d)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(iii)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(iv)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(c)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.314(b)(2)(i)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(d)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000405-GPOS-00184</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000185-GPOS-00079</reference>
              <reference href="">SRG-OS-000404-VMM-001650</reference>
              <reference href="">SRG-OS-000405-VMM-001660</reference>
              <rationale xml:lang="en-US">The risk of a system's physical compromise, particularly mobile systems such as
laptops, places its data at risk of compromise.  Encrypting this data mitigates
the risk of its loss if the system is lost.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-encrypt_partitions_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_home" selected="false" severity="low">
              <version>SLES-12-010850</version>
              <title xml:lang="en-US">Ensure /home Located On Separate Partition</title>
              <description xml:lang="en-US">If user home directories will be stored locally, create a separate partition
for <html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code> at installation time (or migrate it later using LVM). If
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code> will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010850</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91957r3_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001208</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Ensuring that <html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code> is mounted on its own partition enables the
setting of more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_home_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_srv" selected="false" severity="unknown">
              <title xml:lang="en-US">Ensure /srv Located On Separate Partition</title>
              <description xml:lang="en-US">If a file server (FTP, TFTP...) is hosted locally, create a separate partition
for <html:code xmlns:html="http://www.w3.org/1999/xhtml">/srv</html:code> at installation time (or migrate it later using LVM). If
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/srv</html:code> will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later.</description>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R12)</reference>
              <rationale xml:lang="en-US">Srv deserves files for local network file server such as FTP. Ensuring
that <html:code xmlns:html="http://www.w3.org/1999/xhtml">/srv</html:code> is mounted on its own partition enables the setting of
more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_srv_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="false" severity="low">
              <title xml:lang="en-US">Ensure /tmp Located On Separate Partition</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/tmp</html:code> directory is a world-writable directory used
for temporary file storage. Ensure it has its own partition or
logical volume at installation time, or migrate it using LVM.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/tmp</html:code> partition is used as temporary storage by many programs.
Placing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/tmp</html:code> in its own partition enables the setting of more
restrictive mount options, which can help protect programs which use it.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_tmp_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_var" selected="false" severity="low">
              <version>SLES-12-010860</version>
              <title xml:lang="en-US">Ensure /var Located On Separate Partition</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var</html:code> directory is used by daemons and other system
services to store frequently-changing data. Ensure that <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var</html:code> has its own partition
or logical volume at installation time, or migrate it using LVM.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010860</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91961r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000341-VMM-001220</reference>
              <rationale xml:lang="en-US">Ensuring that <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var</html:code> is mounted on its own partition enables the
setting of more restrictive mount options. This helps protect
system services such as daemons or other programs which use it.
It is not uncommon for the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var</html:code> directory to contain
world-writable directories installed by other software packages.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-partition_for_var:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_var_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure /var/log Located On Separate Partition</title>
              <description xml:lang="en-US">System logs are stored in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log</html:code> directory.
Ensure that it has its own partition or logical
volume at installation time, or migrate it using LVM.</description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <rationale xml:lang="en-US">Placing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log</html:code> in its own partition
enables better separation between log files
and other files in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/</html:code>.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_var_log_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="false" severity="low">
              <version>SLES-12-010870</version>
              <title xml:lang="en-US">Ensure /var/log/audit Located On Separate Partition</title>
              <description xml:lang="en-US">Audit logs are stored in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit</html:code> directory.  Ensure that it
has its own partition or logical volume at installation time, or migrate it
later using LVM. Make absolutely certain that it is large enough to store all
audit logs that will be created by the auditing daemon.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010870</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91967r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.1.12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">6</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO11.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI04.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">MEA02.01</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(a)(2)(ii)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.3.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.4.2.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.11</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.4.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.7.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.17.2.1</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32(1)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-4</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-4</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000341-VMM-001220</reference>
              <rationale xml:lang="en-US">Placing <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/log/audit</html:code> in its own partition
enables better separation between audit files
and other files, and helps ensure that
auditing cannot be halted due to the partition running out
of space.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-partition_for_var_log_audit:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_partition_for_home_dirs" selected="false" severity="low">
              <version>SLES-12-010850</version>
              <title xml:lang="en-US">Ensure Home Directories are Located On Separate Partition</title>
              <description xml:lang="en-US">If user home directories will be stored locally, create a separate partition,
e.g. <html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code>, at installation time (or migrate it later using LVM). If
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/home</html:code> will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010850</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91957r3_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <rationale xml:lang="en-US">Ensuring that home directories are mounted on their own partition enables the
setting of more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage.</rationale>
              <platform idref="cpe:/a:machine"/>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-partition_for_home_dirs:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-partition_for_home_dirs_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_gnome">
            <title xml:lang="en-US">GNOME Desktop Environment</title>
            <description xml:lang="en-US">GNOME is a graphical desktop environment bundled with many Linux distributions that
allow users to easily interact with the operating system graphically rather than
textually. The GNOME Graphical Display Manager (GDM) provides login, logout, and user
switching contexts as well as display server management.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
GNOME is developed by the GNOME Project and is considered the default
Red Hat Graphical environment.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For more information on GNOME and the GNOME Project, see <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="https://www.gnome.org">https://www.gnome.org</html:a></html:b>.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_enable_dconf_user_profile" selected="false" severity="high">
              <title xml:lang="en-US">Configure GNOME3 DConf User Profile</title>
              <description xml:lang="en-US">By default, DConf provides a standard user profile. This profile contains a list
of DConf configuration databases. The user profile and database always take the
highest priority. As such the DConf User profile should always exist and be
configured correctly.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

To make sure that the user profile is configured correctly, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/profile/gdm</html:code>
should be set as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">user-db:user
system-db:gdm
</html:pre></description>
              <rationale xml:lang="en-US">Failure to have a functional DConf profile prevents GNOME3 configuration settings
from being enforced for all users and allows various security risks.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="enable_dconf_user_profile" system="urn:xccdf:fix:script:sh">
echo -e 'user-db:user\nsystem-db:gdm' &gt; /etc/dconf/profile/gdm
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-enable_dconf_user_profile:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-enable_dconf_user_profile_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_dconf_use_text_backend" selected="false" severity="high">
              <title xml:lang="en-US">Force dconf to use the textfiles instead of a binary DB</title>
              <description xml:lang="en-US">By default, DConf uses a binary database as a data backend.
The database is compiled from config files by the <html:pre xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:pre> command.

dconf can be configured to look into those text files directly by inserting the
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">service-db:keyfile/user</html:pre>
directive at the beginning of the <html:pre xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/profile/user</html:pre> file.</description>
              <rationale xml:lang="en-US">Unlike text config files, the binary database is impossible to check by OVAL.
Therefore, in order to evaluate dconf configuration, both have to be true at the same time -
configuration files have to be compliant, and dconf has to be forced to use them
as the primary settings storage.</rationale>
              <platform idref="cpe:/a:machine"/>
              <fix id="dconf_use_text_backend" system="urn:xccdf:fix:script:sh">
mkdir -p /etc/dconf/profile

if test -f /etc/dconf/profile/user
then
	sed -i '1s|^|service-db:keyfile/user\n|' /etc/dconf/profile/user
else
	echo 'service-db:keyfile/user' &gt; /etc/dconf/profile/user
fi
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-dconf_use_text_backend:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-dconf_use_text_backend_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_gnome_login_screen">
              <title xml:lang="en-US">Configure GNOME Login Screen</title>
              <description xml:lang="en-US">In the default GNOME desktop, the login is displayed after system boot
and can display user accounts, allow users to reboot the system, and allow users to
login automatically and/or with a guest account. The login screen should be configured
to prevent such behavior.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

For more information about enforcing preferences in the GNOME3 environment using the DConf
configuration system, see <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Desktop_Migration_and_Administration_Guide/index.html">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Desktop_Migration_and_Administration_Guide/index.html</html:a>/&gt;</html:b> and the man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf(1)</html:code>.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_disable_user_list" selected="false" severity="medium">
                <title xml:lang="en-US">Disable the User List</title>
                <description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that displays
all known users. This functionality should be disabled.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Run the following command to disable the user list:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/gdm/simple-greeter/disable_user_list true</html:pre></description>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-23</reference>
                <rationale xml:lang="en-US">Leaving the user list enabled is a security risk since it allows anyone
with physical access to the system to quickly enumerate known user accounts
without logging in.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_restart_shutdown" selected="false" severity="high">
                <title xml:lang="en-US">Disable the GNOME Login Restart and Shutdown Buttons</title>
                <description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that allows
any user, known or unknown, the ability shutdown or restart
the system. This functionality should be disabled by running the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/gdm/simple-greeter/disable_restart_buttons true</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">A user who is at the console can reboot the system at the login screen. If restart or shutdown buttons
are pressed at the login screen, this can create the risk of short-term loss of availability of systems
due to reboot.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_automatic_login" selected="false" severity="high">
                <version>SLES-12-010380</version>
                <title xml:lang="en-US">Disable GDM Automatic Login</title>
                <description xml:lang="en-US">The GNOME Display Manager (GDM) can allow users to automatically login without
user interaction or credentials. User should always be required to authenticate themselves
to the system that they are authorized to use. To disable user ability to automatically
login to the system, set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">AutomaticLoginEnable</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">false</html:code> in the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">[daemon]</html:code> section in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/gdm/custom.conf</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[daemon]
AutomaticLoginEnable=false</html:pre></description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010380</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91829r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.1</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FIA_AFL.1</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00229</reference>
                <rationale xml:lang="en-US">Failure to restrict system access to authenticated users negatively impacts operating
system security.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="gnome_gdm_disable_automatic_login" system="urn:xccdf:fix:script:sh">
if rpm --quiet -q gdm
then
	if ! grep -q "^AutomaticLoginEnable=" /etc/gdm/custom.conf
	then
		sed -i "/^\[daemon\]/a \
		AutomaticLoginEnable=False" /etc/gdm/custom.conf
	else
		sed -i "s/^AutomaticLoginEnable=.*/AutomaticLoginEnable=False/g" /etc/gdm/custom.conf
	fi
fi
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-gnome_gdm_disable_automatic_login:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_gnome_media_settings">
              <title xml:lang="en-US">GNOME Media Settings</title>
              <description xml:lang="en-US">GNOME media settings that apply to the graphical interface.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="false" severity="unknown">
                <title xml:lang="en-US">Disable GNOME Automounting</title>
                <description xml:lang="en-US">The system's default desktop environment, GNOME, will mount
devices and removable media (such as DVDs, CDs and USB flash drives) whenever
they are inserted into the system. Disable automount and autorun within GNOME
by running the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/nautilus/preferences/media_automount false
$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/nautilus/preferences/media_autorun_never true</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO13.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-3</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-6</reference>
                <rationale xml:lang="en-US">Disabling automatic mounting in GNOME can prevent
the introduction of malware via removable media.
It will, however, also prevent desktop users from legitimate use
of removable media.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="false" severity="unknown">
                <title xml:lang="en-US">Disable All GNOME Thumbnailers</title>
                <description xml:lang="en-US">The system's default desktop environment, GNOME, uses
a number of different thumbnailer programs to generate thumbnails
for any new or modified content in an opened folder. The following
command can disable the execution of these thumbnail applications:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /desktop/gnome/thumbnailers/disable_all true</html:pre>
This effectively prevents an attacker from gaining access to a
system through a flaw in GNOME's Nautilus thumbnail creators.</description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.11</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.12</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.13</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.PT-3</reference>
                <rationale xml:lang="en-US">An attacker with knowledge of a flaw in a GNOME thumbnailer application could craft a malicious
file to exploit this flaw. Assuming the attacker could place the malicious file on the local filesystem
(via a web upload for example) and assuming a user browses the same location using Nautilus, the
malicious file would exploit the thumbnailer with the potential for malicious code execution. It
is best to disable these thumbnailer applications unless they are explicitly required.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_gnome_network_settings">
              <title xml:lang="en-US">GNOME Network Settings</title>
              <description xml:lang="en-US">GNOME network settings that apply to the graphical interface.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_create" selected="false" severity="medium">
                <title xml:lang="en-US">Disable WIFI Network Connection Creation in GNOME</title>
                <description xml:lang="en-US"><html:code xmlns:html="http://www.w3.org/1999/xhtml">GNOME</html:code> allows users to create ad-hoc wireless connections through the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">NetworkManager</html:code> applet. Wireless connections should be disabled by
running the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/nm-applet/disable-wifi-create true</html:pre></description>
                <rationale xml:lang="en-US">Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_disconnect" selected="false" severity="medium">
                <title xml:lang="en-US">Disable WIFI Network Disconnect Notification in GNOME</title>
                <description xml:lang="en-US">By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">GNOME</html:code> disables WIFI notification when disconnecting from a
wireless network. This should be permanently set so that users do not connect to
a wireless network when the system finds one. While useful for mobile devices,
this setting should be disabled for all other systems. To configure the system
to disable the WIFI notication, run the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/nm-applet/disable-disconnected-notifications true</html:pre></description>
                <rationale xml:lang="en-US">Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_notification" selected="false" severity="medium">
                <title xml:lang="en-US">Disable WIFI Network Connection Notification in GNOME</title>
                <description xml:lang="en-US">By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">GNOME</html:code> disables WIFI notification when connecting to a wireless
network. This should be permanently set so that users do not connect to a wireless
network when the system finds one. While useful for mobile devices, this setting
should be disabled for all other systems. To configure the system to disable the
WIFI notication, run the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/nm-applet/disable-connected-notifications true</html:pre></description>
                <rationale xml:lang="en-US">Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_gnome_remote_access_settings">
              <title xml:lang="en-US">GNOME Remote Access Settings</title>
              <description xml:lang="en-US">GNOME remote access settings that apply to the graphical interface.</description>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_gnome_screen_locking">
              <title xml:lang="en-US">Configure GNOME Screen Locking</title>
              <description xml:lang="en-US">
In the default GNOME3 desktop, the screen can be locked
by selecting the user name in the far right corner of the main panel and
selecting <html:b xmlns:html="http://www.w3.org/1999/xhtml">Lock</html:b>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The following sections detail commands to enforce idle activation of the screensaver,
screen locking, a blank-screen screensaver, and an idle activation time.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Because users should be trained to lock the screen when they
step away from the computer, the automatic locking feature is only
meant as a backup.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The root account can be screen-locked; however, the root account should
<html:i xmlns:html="http://www.w3.org/1999/xhtml">never</html:i> be used to log into an X Windows environment and should only
be used to for direct login via console in emergency circumstances.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For more information about enforcing preferences in the GNOME3 environment using the DConf
configuration system, see <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://wiki.gnome.org/dconf">http://wiki.gnome.org/dconf</html:a></html:b> and
the man page <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf(1)</html:code>.</description>
              <Value id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" type="number">
                <title xml:lang="en-US">Screensaver Inactivity timeout</title>
                <description xml:lang="en-US">Choose allowed duration (in seconds) of inactive graphical sessions</description>
                <value selector="10_minutes">600</value>
                <value selector="15_minutes">900</value>
                <value selector="30_minutes">1800</value>
                <value selector="5_minutes">300</value>
                <value>900</value>
              </Value>
              <Value id="xccdf_org.ssgproject.content_value_var_screensaver_lock_delay" type="number">
                <title xml:lang="en-US">Screensaver Lock Delay</title>
                <description xml:lang="en-US">Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt</description>
                <value selector="10_seconds">10</value>
                <value selector="5_seconds">5</value>
                <value>0</value>
                <value selector="immediate">0</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_screensaver_idle_delay" selected="false" severity="medium">
                <version>SLES-12-010080</version>
                <title xml:lang="en-US">Set GNOME3 Screensaver Inactivity Timeout</title>
                <description xml:lang="en-US">

To activate the GNOME3 lock screen after no less than 15 minutes, make sure that the GNOME <html:code xmlns:html="http://www.w3.org/1999/xhtml">idle-delay</html:code> setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">org.gnome.desktop.session-delay</html:code> is set to <html:code xmlns:html="http://www.w3.org/1999/xhtml">900</html:code> or less for each user:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">gsettings get org.gnome.desktop.session idle-delay
900</html:pre>

To ensure that this setting is not modified by users, set it in an appropriate configuration file in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d</html:code> directory
and lock it in a file in the <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/locks</html:code> directory to prevent user modification.

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For example, to configure the system for a 15 minute delay, add the following to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/00-security-settings</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/desktop/session]
idle-delay=uint32 900</html:pre>
Once the setting has been added, add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/locks/00-security-settings-lock</html:code> to prevent user modification.
For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/desktop/session/idle-delay</html:pre>
After the settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.</description>
                <warning xml:lang="en-US" category="dependency">When selecting this rule in a profile,
    make sure that rule with ID <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf_use_text_backend</html:code> is selected as well: <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code>-related rules can't be checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> if <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> is using a binary database as it's data backend. <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> has to be forced to use config files directly as backend, as those config files are checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> probes.</warning>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010080</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91757r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.10</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000057</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000029-GPOS-00010</reference>
                <rationale xml:lang="en-US">A session time-out lock is a temporary action taken when a user stops work and moves away from
the immediate physical vicinity of the information system but does not logout because of the
temporary nature of the absence. Rather than relying on the user to manually lock their operating
system session prior to vacating the vicinity, GNOME3 can be configured to identify when
a user's session has idled and take action to initiate a session lock.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_screensaver_idle_delay_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_screensaver_mode_blank" selected="false" severity="medium">
                <version>SLES-12-010100</version>
                <title xml:lang="en-US">Implement Blank Screensaver</title>
                <description xml:lang="en-US">

To set the screensaver mode in the GNOME3 desktop to a blank screen,
add or set <html:code xmlns:html="http://www.w3.org/1999/xhtml">picture-uri</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">''</html:code> for each user:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">gsettings set org.gnome.desktop.screensaver picture-uri ''</html:pre>

To ensure that this setting is not modified by users, you can

add or set <html:code xmlns:html="http://www.w3.org/1999/xhtml">picture-uri</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">string ''</html:code> in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/00-security-settings</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/desktop/screensaver]
picture-uri=''
</html:pre>
Once the settings have been added, add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/locks/00-security-settings-lock</html:code> to prevent user modification.
For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/desktop/screensaver/picture-uri</html:pre>
After the settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.</description>
                <warning xml:lang="en-US" category="dependency">When selecting this rule in a profile,
    make sure that rule with ID <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf_use_text_backend</html:code> is selected as well: <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code>-related rules can't be checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> if <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> is using a binary database as it's data backend. <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> has to be forced to use config files directly as backend, as those config files are checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> probes.</warning>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010100</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91761r2_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.5.5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.10</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000060</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <rationale xml:lang="en-US">Setting the screensaver mode to blank-only conceals the
contents of the display from passersby.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_screensaver_mode_blank_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screen_locking_keybindings" selected="false" severity="low">
                <title xml:lang="en-US">Set GNOME Screen Locking Keybindings</title>
                <description xml:lang="en-US">Run the following command to prevent changes to the screensaver lock
keybindings:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gnome_settings_daemon/keybindings/screensaver "&lt;Control&gt;&lt;Alt&gt;l"</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">The ability to lock graphical desktop sessions manually allows users to
easily secure their accounts should they need to depart from their workstations
temporarily.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screen_locking_keybindings_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="false" severity="medium">
                <title xml:lang="en-US">GNOME Desktop Screensaver Mandatory Use</title>
                <description xml:lang="en-US">Run the following command to activate the screensaver
in the GNOME desktop after a period of inactivity:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/gnome-screensaver/idle_activation_enabled true</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <rationale xml:lang="en-US">Enabling idle activation of the screensaver ensures the screensaver will
be activated after the idle delay.  Applications requiring continuous,
real-time screen display (such as network management products) require the
login session does not have administrator rights and the display station is located in a
controlled-access area.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="false" severity="medium">
                <title xml:lang="en-US">Set GNOME Login Inactivity Timeout</title>
                <description xml:lang="en-US">Run the following command to set the idle time-out value for
inactivity in the GNOME desktop to <sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy"/> minutes:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo gconftool-2 \
  --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type int \
  --set /desktop/gnome/session/idle_delay <sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy"/></html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <rationale xml:lang="en-US">Setting the idle delay controls when the
screensaver will start, and can be combined with
screen locking to prevent access from passersby.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="false" severity="medium">
                <title xml:lang="en-US">Enable Screen Lock Activation After Idle Period</title>
                <description xml:lang="en-US">Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/gnome-screensaver/lock_enabled true</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <rationale xml:lang="en-US">Enabling the activation of the screen lock after an idle period
ensures password entry will be required in order to
access the system, preventing access by passersby.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_action" selected="false" severity="medium">
                <title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity Action</title>
                <description xml:lang="en-US">Run the following command to set force logout an inactive user when the
maximum allowed inactivity period has expired:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type string \
  --set /desktop/gnome/session/max_idle_action "forced-logout"</html:pre></description>
                <rationale xml:lang="en-US">Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_time" selected="false" severity="medium">
                <title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity</title>
                <description xml:lang="en-US">Run the following command to set the maximum allowed period of inactivity for an
inactive user in the GNOME desktop to <sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy"/> minutes:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo gconftool-2 \
  --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type int \
  --set /desktop/gnome/session/max_idle_time <sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy"/></html:pre></description>
                <rationale xml:lang="en-US">Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="false" severity="unknown">
                <title xml:lang="en-US">Implement Blank Screensaver</title>
                <description xml:lang="en-US">Run the following command to set the screensaver mode
in the GNOME desktop to a blank screen:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type string \
  --set /apps/gnome-screensaver/mode blank-only</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
                <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-8.1.8</reference>
                <rationale xml:lang="en-US">Setting the screensaver mode to blank-only conceals the
contents of the display from passersby.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_enable_lock_screen" selected="false" severity="medium">
                <version>SLES-12-010060</version>
                <title xml:lang="en-US">Enable GNOME3 Lock Screen</title>
                <description xml:lang="en-US">To activate the GNOME3 lock screen, make sure that the GNOME <html:code xmlns:html="http://www.w3.org/1999/xhtml">disable-lock-screen</html:code> setting in <html:code xmlns:html="http://www.w3.org/1999/xhtml">org.gnome.desktop.lockdown</html:code> is set to <html:code xmlns:html="http://www.w3.org/1999/xhtml">false</html:code> for each user:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">gsettings get org.gnome.desktop.lockdown disable-lock-screen
false</html:pre>

To activate the lock screen for an existing user, run:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">gsettings set org.gnome.desktop.lockdown disable-lock-screen false</html:pre>


To activate the lock screen by default, add or set <html:code xmlns:html="http://www.w3.org/1999/xhtml">disable-lock-screen</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">false</html:code> in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/00-security-settings</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/desktop/lockdown]
disable-lock-screen=false
</html:pre>

Once the settings have been added, you can add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/locks/00-security-settings-lock</html:code> to prevent user modification.
For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/desktop/lockdown/disable-lock-screen</html:pre>

After the global settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.</description>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010060</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91753r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000056</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000028-GPOS-00009</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000030-GPOS-00011</reference>
                <rationale xml:lang="en-US">A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity
of the information system but does not want to logout because of the temporary nature of the absense.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_enable_lock_screen_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_gnome_system_settings">
              <title xml:lang="en-US">GNOME System Settings</title>
              <description xml:lang="en-US">GNOME provides configuration and functionality to a graphical desktop environment
that changes grahical configurations or allow a user to perform
actions that users normally would not be able to do in non-graphical mode such as
remote access configuration, power policies, Geo-location, etc.
Configuring such settings in GNOME will prevent accidential graphical configuration
changes by users from taking place.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_dconf_gnome_disable_ctrlaltdel_reboot" selected="false" severity="high">
                <version>SLES-12-010610</version>
                <title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3</title>
                <description xml:lang="en-US">By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">GNOME</html:code> will reboot the system if the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence is pressed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To configure the system to ignore the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence
from the Graphical User Interface (GUI) instead of rebooting the system,
add or set <html:code xmlns:html="http://www.w3.org/1999/xhtml">logout</html:code> to <html:code xmlns:html="http://www.w3.org/1999/xhtml">string ''</html:code> in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/00-security-settings</html:code>. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">[org/gnome/settings-daemon/plugins/media-keys]
logout=''</html:pre>
Once the settings have been added, add a lock to
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dconf/db/local.d/locks/00-security-settings-lock</html:code> to prevent
user modification. For example:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">/org/gnome/settings-daemon/plugins/media-keys/logout</html:pre>
After the settings have been set, run <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf update</html:code>.</description>
                <warning xml:lang="en-US" category="dependency">When selecting this rule in a profile,
    make sure that rule with ID <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf_use_text_backend</html:code> is selected as well: <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code>-related rules can't be checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> if <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> is using a binary database as it's data backend. <html:code xmlns:html="http://www.w3.org/1999/xhtml">dconf</html:code> has to be forced to use config files directly as backend, as those config files are checked by <html:code xmlns:html="http://www.w3.org/1999/xhtml">OVAL</html:code> probes.</warning>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010610</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91867r3_rule</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.1.2</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.</rationale>
                <platform idref="cpe:/a:machine"/>
                <fix id="dconf_gnome_disable_ctrlaltdel_reboot" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_include_dconf_settings" use="legacy"/>
include_dconf_settings

dconf_settings 'org/gnome/settings-daemon/plugins/media-keys' 'logout' "''" 'local.d' '00-security-settings'
dconf_lock 'org/gnome/settings-daemon/plugins/media-keys' 'logout' 'local.d' '00-security-settings-lock'
</fix>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-dconf_gnome_disable_ctrlaltdel_reboot:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-dconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_temperature" selected="false" severity="medium">
                <title xml:lang="en-US">Disable the GNOME Clock Temperature Feature</title>
                <description xml:lang="en-US">Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/panel/applets/clock/prefs/show_temperature false</html:pre></description>
                <rationale xml:lang="en-US">Disabling the temperature feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_weather" selected="false" severity="medium">
                <title xml:lang="en-US">Disable the GNOME Clock Weather Feature</title>
                <description xml:lang="en-US">Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type bool \
  --set /apps/panel/applets/clock/prefs/show_weather false</html:pre></description>
                <rationale xml:lang="en-US">Disabling the weather feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_ctrlaltdel_reboot" selected="false" severity="high">
                <title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</title>
                <description xml:lang="en-US">By default, <html:code xmlns:html="http://www.w3.org/1999/xhtml">GNOME</html:code> will reboot the system if the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code>
key sequence is pressed.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
To configure the system to ignore the <html:code xmlns:html="http://www.w3.org/1999/xhtml">Ctrl-Alt-Del</html:code> key sequence from the
Graphical User Interface (GUI) instead of rebooting the system, run the following:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo gconftool-2 --direct \
  --config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
  --type string \
  --set /apps/gnome_settings_daemon/keybindings/power ""</html:pre></description>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.7.3</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 2.1</reference>
                <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 5.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.10.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.1.5</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.11.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.13.2.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.6.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.7.3.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.1.2</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.1</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.4</reference>
                <reference href="https://www.iso.org/standard/54534.html">A.9.4.5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-4</reference>
                <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-5</reference>
                <rationale xml:lang="en-US">A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_integrity">
            <title xml:lang="en-US">System and Software Integrity</title>
            <description xml:lang="en-US">System and software integrity can be gained by installing antivirus, increasing
system encryption strength with FIPS, verifying installed software, enabling SELinux,
installing an Intrusion Prevention System, etc. However, installing or enabling integrity
checking tools cannot <html:i xmlns:html="http://www.w3.org/1999/xhtml">prevent</html:i> intrusions, but they can detect that an intrusion
may have occurred. Requirements for integrity checking may be highly dependent on
the environment in which the system will be used. Snapshot-based approaches such
as AIDE may induce considerable overhead in the presence of frequent software updates.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_disable_prelink" selected="false" severity="medium">
              <title xml:lang="en-US">Disable Prelinking</title>
              <description xml:lang="en-US">The prelinking feature changes binaries in an attempt to decrease their startup
time. In order to disable it, change or add the following line inside the file
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sysconfig/prelink</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">PRELINKING=no</html:pre>
Next, run the following command to return binaries to a normal, non-prelinked state:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo /usr/sbin/prelink -ua</html:pre></description>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.5.4</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.3</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI02.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.07</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.13.11</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002450</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(3)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-11.5</reference>
              <reference href="">SRG-OS-000120-VMM-000600</reference>
              <reference href="">SRG-OS-000478-VMM-001980</reference>
              <reference href="">SRG-OS-000396-VMM-001590</reference>
              <rationale xml:lang="en-US">Because the prelinking feature changes binaries, it can interfere with the
operation of certain software and/or modes such as AIDE, FIPS, etc.</rationale>
              <fix id="disable_prelink" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_disable_prelink" use="legacy"/>
disable_prelink
</fix>
            </Rule>
            <Group id="xccdf_org.ssgproject.content_group_certified-vendor">
              <title xml:lang="en-US">Operating System Vendor Support and Certification</title>
              <description xml:lang="en-US">The assurance of a vendor to provide operating system support and maintenance
for their product is an important criterion to ensure product stability and
security over the life of the product. A certified product that follows the
necessary standards and government certification requirements guarantees that
known software vulnerabilities will be remediated, and proper guidance for
protecting and securing the operating system will be given.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_installed_OS_is_FIPS_certified" selected="false" severity="high">
                <title xml:lang="en-US">The Installed Operating System Is FIPS 140-2 Certified</title>
                <description xml:lang="en-US">To enable processing of sensitive information the operating system must
provide certified cryptographic modules compliant with FIPS 140-2
standard.</description>
                <warning xml:lang="en-US" category="general">There is no remediation besides switching to a different operating system.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002450</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
                <reference href="">SRG-OS-000120-VMM-000600</reference>
                <reference href="">SRG-OS-000478-VMM-001980</reference>
                <reference href="">SRG-OS-000396-VMM-001590</reference>
                <rationale xml:lang="en-US">The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS
PUB 140-2) is a computer security standard. The standard specifies security
requirements for cryptographic modules used to protect sensitive
unclassified information.  Refer to the full FIPS 140-2 standard at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf">http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf</html:a>
for further details on the requirements.
FIPS 140-2 validation is required by U.S. law when information systems use
cryptography to protect sensitive government information. In order to
achieve FIPS 140-2 certification, cryptographic modules are subject to
extensive testing by independent laboratories, accredited by National
Institute of Standards and Technology (NIST).</rationale>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-installed_OS_is_FIPS_certified:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-installed_OS_is_FIPS_certified_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_installed_OS_is_certified" selected="false" severity="high">
                <version>SLES-12-010000</version>
                <title xml:lang="en-US">The Installed Operating System Is Vendor Supported and Certified</title>
                <description xml:lang="en-US">The installed operating system must be maintained and certified by a vendor.
SUSE Linux Enterprise is supported and maintained by SUSE. SUSE is responsible for
providing security patches as well as meeting and maintaining goverment
certifications and standards.

Up-to date information on the support status of your operating system release can be found at

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://www.suse.com/lifecycle/">https://www.suse.com/lifecycle/</html:a></description>
                <warning xml:lang="en-US" category="general">There is no remediation besides switching to a different operating system.</warning>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010000</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91741r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2(c)</reference>
                <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                <rationale xml:lang="en-US">An operating system is considered "supported" if the vendor continues to provide
security patches for the product as well as maintain government certification requirements.
With an unsupported release, it will not be possible to resolve security issue discovered in
the system software as well as meet government certifications.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_crypto">
              <title xml:lang="en-US">System Cryptographic Policies</title>
              <description xml:lang="en-US">Linux has the capability to centrally configure cryptographic polices. The command
<html:code xmlns:html="http://www.w3.org/1999/xhtml">update-crypto-policies</html:code> is used to set the policy applicable for the various
cryptographic back-ends, such as SSL/TLS libraries. The configured cryptographic
policies will be the default policy used by these backends unless the application
user configures them otherwise. When the system has been configured to use the
centralized cryptographic policies, the administrator is assured that any application
that utilizes the supported backends will follow a policy that adheres to the
configured profile.

Currently the supported backends are:
<html:ul xmlns:html="http://www.w3.org/1999/xhtml"><html:li>GnuTLS library</html:li><html:li>OpenSSL library</html:li><html:li>NSS library</html:li><html:li>OpenJDK</html:li><html:li>Libkrb5</html:li><html:li>BIND</html:li><html:li>OpenSSH</html:li></html:ul>
Applications and languages which rely on any of these backends will follow the
system policies as well. Examples are apache httpd, nginx, php, and others.</description>
              <Value id="xccdf_org.ssgproject.content_value_var_system_crypto_policy" type="string">
                <title xml:lang="en-US">The system-provided crypto policies</title>
                <description xml:lang="en-US">Specify the crypto policy for the system.</description>
                <value>DEFAULT</value>
                <value selector="fips">FIPS</value>
                <value selector="legacy">LEGACY</value>
                <value selector="future">FUTURE</value>
                <value selector="next">NEXT</value>
              </Value>
              <Rule id="xccdf_org.ssgproject.content_rule_configure_crypto_policy" selected="false" severity="high">
                <title xml:lang="en-US">Configure System Cryptography Policy</title>
                <description xml:lang="en-US">To configure the system cyptography policy to use ciphers only from the <html:code xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1"><sub idref="xccdf_org.ssgproject.content_value_var_system_crypto_policy" use="legacy"/></html:code>
policy, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://checklists.nist.gov/xccdf/1.1">$ sudo update-crypto-policies --set <sub idref="xccdf_org.ssgproject.content_value_var_system_crypto_policy" use="legacy"/></html:pre></description>
                <rationale xml:lang="en-US">Centralized cryptographic policies simplify applying secure ciphers across an operating system and
the applications that run on that operating system. Use of weak or untested encryption algorithms
undermines the purposes of utilizing encryption to protect data.</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-configure_crypto_policy_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_endpoint_security_software">
              <title xml:lang="en-US">Endpoint Protection Software</title>
              <description xml:lang="en-US">Endpoint protection security software that is not provided or supported

by Red Hat can be installed to provide complementary or duplicative

security capabilities to those provided by the base platform.  Add-on
software may not be appropriate for some specialized systems.</description>
              <Rule id="xccdf_org.ssgproject.content_rule_configure_user_data_backups" selected="false" severity="medium">
                <title xml:lang="en-US">Configure Backups of User Data</title>
                <description xml:lang="en-US">The operating system must conduct backups of user data contained
in the operating system. The operating system provides utilities for
automating backups of user data. Commercial and open-source products
are also available.</description>
                <rationale xml:lang="en-US">Operating system backup is a critical step in maintaining data assurance and
availability. User-level information is data generated by information system
and/or application users. Backups shall be consistent with organizational
recovery time and recovery point objectives.false</rationale>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-configure_user_data_backups_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Group id="xccdf_org.ssgproject.content_group_mcafee_security_software">
                <title xml:lang="en-US">McAfee Endpoint Security Software</title>
                <description xml:lang="en-US">In DoD environments, McAfee Host-based Security System (HBSS) and
VirusScan Enterprise for Linux (VSEL) is required to be installed on all systems.</description>
                <Value id="xccdf_org.ssgproject.content_value_var_mcafee_antivirus_definition_expire" type="number">
                  <title xml:lang="en-US">The age of McAfee defintion file before requiring updating</title>
                  <description xml:lang="en-US">Specify the amount of time (in seconds) before McAfee definition files need to be
updated.</description>
                  <value>2592000</value>
                  <value selector="1_day">86400</value>
                  <value selector="1_week">604800</value>
                  <value selector="30_days">2592000</value>
                </Value>
                <Group id="xccdf_org.ssgproject.content_group_mcafee_hbss_software">
                  <title xml:lang="en-US">McAfee Host-Based Intrusion Detection Software (HBSS)</title>
                  <description xml:lang="en-US">McAfee Host-based Security System (HBSS) is a suite of software applications
used to monitor, detect, and defend computer networks and systems.</description>
                </Group>
              </Group>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_fips">
              <title xml:lang="en-US">Federal Information Processing Standard (FIPS)</title>
              <description xml:lang="en-US">The Federal Information Processing Standard (FIPS) is a computer security standard which
is developed by the U.S. Government and industry working groups to validate the quality
of cryptographic modules. The FIPS standard provides four security levels to ensure
adequate coverage of different industries, implementation of cryptographic modules, and
organizational sizes and requirements.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules
utilize authentication that meets industry and government requirements. For government systems, this allows
Security Levels 1, 2, 3, or 4 for use on SUSE Linux Enterprise 12.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
See <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://csrc.nist.gov/publications/PubsFIPS.html">http://csrc.nist.gov/publications/PubsFIPS.html</html:a></html:b> for more information.</description>
              <platform idref="cpe:/a:machine"/>
              <Rule id="xccdf_org.ssgproject.content_rule_enable_dracut_fips_module" selected="false" severity="medium">
                <title xml:lang="en-US">Enable Dracut FIPS Module</title>
                <description xml:lang="en-US">To enable FIPS mode, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">fips-mode-setup --enable</html:pre>
To enable FIPS, the system requires that the <html:code xmlns:html="http://www.w3.org/1999/xhtml">fips</html:code> module is added in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">dracut</html:code> configuration.
Check if <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/dracut.conf.d/40-fips.conf</html:code> contain <html:code xmlns:html="http://www.w3.org/1999/xhtml">add_dracutmodules+=" fips "</html:code></description>
                <warning xml:lang="en-US" category="general">The system needs to be rebooted for these changes to take effect.</warning>
                <warning xml:lang="en-US" category="regulatory">The ability to enable FIPS does not denote FIPS compliancy or certification.

SUSE Linux Enterprise 12 is FIPS certified and compliant.

Community projects such as CentOS, Scientific Linux, Fedora, etc. do not necessarily meet
FIPS certification and compliancy. Therefore, non-certified vendors and/or projects do not
meet this requirement even if technically feasible.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
See <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm</html:a></html:b>
for a list of FIPS certified vendors.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002450</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="">SRG-OS-000120-VMM-000600</reference>
                <reference href="">SRG-OS-000478-VMM-001980</reference>
                <reference href="">SRG-OS-000396-VMM-001590</reference>
                <rationale xml:lang="en-US">Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-enable_dracut_fips_module:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-enable_dracut_fips_module_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_enable_fips_mode" selected="false" severity="high">
                <version>SLES-12-010420</version>
                <title xml:lang="en-US">Enable FIPS Mode</title>
                <description xml:lang="en-US">
Enabling FIPS mode on a preexisting system involves a number of
modifications to the SUSE operating system.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">patterns-sles-fips</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install patterns-sles-fips</html:pre>

Then refer to section 9.1, "Crypto
Officer Guidance", of the following document for installation guidance:


    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf</html:a>

Furthermore, the system running in FIPS mode should be FIPS certified by NIST.</description>
                <warning xml:lang="en-US" category="general">The system needs to be rebooted for these changes to take effect.</warning>
                <warning xml:lang="en-US" category="regulatory">The ability to enable FIPS does not denote FIPS compliancy or certification.

SUSE Linux Enterprise 12 is FIPS certified and compliant.

Community projects such as CentOS, Scientific Linux, Fedora, openSUSE, etc. do not necessarily meet
FIPS certification and compliancy. Therefore, non-certified vendors and/or projects do not
meet this requirement even if technically feasible.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
See <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm</html:a></html:b>
for a list of FIPS certified vendors.</warning>
                <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010420</reference>
                <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91837r2_rule</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002450</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="">SRG-OS-000120-VMM-000600</reference>
                <reference href="">SRG-OS-000478-VMM-001980</reference>
                <reference href="">SRG-OS-000396-VMM-001590</reference>
                <rationale xml:lang="en-US">Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-export export-name="oval:ssg-var_system_crypto_policy:var:1" value-id="xccdf_org.ssgproject.content_value_var_system_crypto_policy"/>
                  <check-content-ref name="oval:ssg-enable_fips_mode:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-enable_fips_mode_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
              <Rule id="xccdf_org.ssgproject.content_rule_sysctl_crypto_fips_enabled" selected="false" severity="high">
                <title xml:lang="en-US">Set kernel parameter 'crypto.fips_enabled' to 1</title>
                <description xml:lang="en-US">System running in FIPS mode is indicated by kernel parameter
<html:code xmlns:html="http://www.w3.org/1999/xhtml">'crypto.fips_enabled'</html:code>. This parameter should be set to <html:code xmlns:html="http://www.w3.org/1999/xhtml">1</html:code>
in FIPS mode.
To enable FIPS mode, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">fips-mode-setup --enable</html:pre></description>
                <warning xml:lang="en-US" category="general">The system needs to be rebooted for these changes to take effect.</warning>
                <warning xml:lang="en-US" category="regulatory">The ability to enable FIPS does not denote FIPS compliancy or certification.

SUSE Linux Enterprise 12 is FIPS certified and compliant.

Community projects such as CentOS, Scientific Linux, Fedora, etc. do not necessarily meet
FIPS certification and compliancy. Therefore, non-certified vendors and/or projects do not
meet this requirement even if technically feasible.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
See <html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm</html:a></html:b>
for a list of FIPS certified vendors.</warning>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000068</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000803</reference>
                <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002450</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</reference>
                <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</reference>
                <reference href="">SRG-OS-000120-VMM-000600</reference>
                <reference href="">SRG-OS-000478-VMM-001980</reference>
                <reference href="">SRG-OS-000396-VMM-001590</reference>
                <rationale xml:lang="en-US">Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.</rationale>
                <platform idref="cpe:/a:machine"/>
                <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                  <check-content-ref name="oval:ssg-sysctl_crypto_fips_enabled:def:1" href="ssg-sle12-oval.xml"/>
                </check>
                <check system="http://scap.nist.gov/schema/ocil/2">
                  <check-content-ref name="ocil:ssg-sysctl_crypto_fips_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                </check>
              </Rule>
            </Group>
            <Group id="xccdf_org.ssgproject.content_group_software-integrity">
              <title xml:lang="en-US">Software Integrity Checking</title>
              <description xml:lang="en-US">Both the AIDE (Advanced Intrusion Detection Environment)
software and the RPM package management system provide
mechanisms for verifying the integrity of installed software.
AIDE uses snapshots of file metadata (such as hashes) and compares these
to current system files in order to detect changes.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
The RPM package management system can conduct integrity
checks by comparing information in its metadata database with
files installed on the system.</description>
              <Group id="xccdf_org.ssgproject.content_group_aide">
                <title xml:lang="en-US">Verify Integrity with AIDE</title>
                <description xml:lang="en-US">AIDE conducts integrity checks by comparing information about
files with previously-gathered information. Ideally, the AIDE database is
created immediately after initial system configuration, and then again after any
software update.  AIDE is highly configurable, with further configuration
information located in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/share/doc/aide-<html:i>VERSION</html:i></html:code>.</description>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_build_database" selected="false" severity="medium">
                  <title xml:lang="en-US">Build and Test AIDE Database</title>
                  <description xml:lang="en-US">Run the following command to generate a new database:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo /usr/sbin/aide --init</html:pre>
By default, the database will be written to the file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/var/lib/aide/aide.db.new.gz</html:code>.
Storing the database, the configuration file <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/aide.conf</html:code>, and the binary
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/usr/sbin/aide</html:code> (or hashes of these files), in a secure location (such as on read-only media) provides additional assurance about their integrity.
The newly-generated database can be installed as follows:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz</html:pre>
To initiate a manual check, run the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo /usr/sbin/aide --check</html:pre>
If this check produces any unexpected output, investigate.</description>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.3</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI02.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(3)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-3</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-11.5</reference>
                  <rationale xml:lang="en-US">For AIDE to be effective, an initial database of "known-good" information about files
must be captured and it should be able to be verified against the installed files.</rationale>
                  <fix id="aide_build_database" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="restrict">- name: Ensure AIDE is installed
  package:
    name: '{{ item }}'
    state: present
  with_items:
    - aide
  tags:
    - aide_build_database
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3

- name: Build and Test AIDE Database
  command: /usr/sbin/aide --init
  changed_when: true
  tags:
    - aide_build_database
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3

- name: Check whether the stock AIDE Database exists
  stat:
    path: /var/lib/aide/aide.db.new.gz
  register: aide_database_stat
  tags:
    - aide_build_database
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3

- name: Stage AIDE Database
  copy:
    src: /var/lib/aide/aide.db.new.gz
    dest: /var/lib/aide/aide.db.gz
    backup: true
    remote_src: true
  when: (aide_database_stat.stat.exists is defined and aide_database_stat.stat.exists)
  tags:
    - aide_build_database
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3
</fix>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_build_database_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="false" severity="medium">
                  <version>SLES-12-010500</version>
                  <title xml:lang="en-US">Configure Periodic Execution of AIDE</title>
                  <description xml:lang="en-US">At a minimum, AIDE should be configured to run a weekly scan. At most, AIDE should be run daily.
To implement a daily execution of AIDE at 4:05am using cron, add the following line to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/crontab</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">05 4 * * * root /usr/sbin/aide --check</html:pre>
To implement a weekly execution of AIDE at 4:05am using cron, add the following line to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/crontab</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">05 4 * * 0 root /usr/sbin/aide --check</html:pre>
AIDE can be executed periodically through other means; this is merely one example.
The usage of cron's special time codes, such as  <html:code xmlns:html="http://www.w3.org/1999/xhtml">@daily</html:code> and
<html:code xmlns:html="http://www.w3.org/1999/xhtml">@weekly</html:code> is acceptable.</description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010500</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91847r3_rule</reference>
                  <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.3.2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.3</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI02.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001744</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(5)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(3)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-3</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-11.5</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000363-GPOS-00150</reference>
                  <rationale xml:lang="en-US">By default, AIDE does not install itself for periodic execution. Periodically
running AIDE is necessary to reveal unexpected changes in installed files.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Unauthorized changes to the baseline configuration could make the system vulnerable
to various attacks or allow unauthorized access to the operating system. Changes to
operating system configurations can have unintended side effects, some of which may
be relevant to security.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Detecting such changes and providing an automated response can help avoid unintended,
negative consequences that could ultimately affect the security state of the operating
system. The operating system's Information Management Officer (IMO)/Information System
Security Officer (ISSO) and System Administrators (SAs) must be notified via email and/or
monitoring system trap when there is an unauthorized modification of a configuration item.</rationale>
                  <platform idref="cpe:/a:machine"/>
                  <fix id="aide_periodic_cron_checking" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide

if ! grep -q "/usr/sbin/aide --check" /etc/crontab ; then
    echo "05 4 * * * root /usr/sbin/aide --check" &gt;&gt; /etc/crontab
fi
</fix>
                  <fix id="aide_periodic_cron_checking" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="restrict">- name: Ensure AIDE is installed
  package:
    name: '{{ item }}'
    state: present
  with_items:
    - aide
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - aide_periodic_cron_checking
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-3(5)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3
    - DISA-STIG-010500

- name: Configure Periodic Execution of AIDE
  cron:
    name: run AIDE check
    minute: 5
    hour: 4
    weekday: 0
    user: root
    job: /usr/sbin/aide --check
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - aide_periodic_cron_checking
    - medium_severity
    - restrict_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-3(5)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3
    - DISA-STIG-010500
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-aide_periodic_cron_checking:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_scan_notification" selected="false" severity="medium">
                  <version>SLES-12-010510</version>
                  <title xml:lang="en-US">Configure Notification of Post-AIDE Scan Details</title>
                  <description xml:lang="en-US">AIDE should notify appropriate personnel of the details of a scan after the scan has been run.
If AIDE has already been configured for periodic execution in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/crontab</html:code>, append the
following line to the existing AIDE line:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml"> | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost</html:pre>
Otherwise, add the following line to <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/crontab</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">05 4 * * * root /usr/sbin/aide --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost</html:pre>
AIDE can be executed periodically through other means; this is merely one example.</description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002702</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-6d</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010510</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91849r2_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001744</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(5)</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-3</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000363-GPOS-00150</reference>
                  <rationale xml:lang="en-US">Unauthorized changes to the baseline configuration could make the system vulnerable
to various attacks or allow unauthorized access to the operating system. Changes to
operating system configurations can have unintended side effects, some of which may
be relevant to security.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Detecting such changes and providing an automated response can help avoid unintended,
negative consequences that could ultimately affect the security state of the operating
system. The operating system's Information Management Officer (IMO)/Information System
Security Officer (ISSO) and System Administrators (SAs) must be notified via email and/or
monitoring system trap when there is an unauthorized modification of a configuration item.</rationale>
                  <fix id="aide_scan_notification" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide

CRONTAB=/etc/crontab
CRONDIRS='/etc/cron.d /etc/cron.daily /etc/cron.weekly /etc/cron.monthly'

if [ -f /var/spool/cron/root ]; then
	VARSPOOL=/var/spool/cron/root
fi

if ! grep -qR '^.*\/usr\/sbin\/aide\s*\-\-check.*|.*\/bin\/mail\s*-s\s*".*"\s*root@.*$' $CRONTAB $VARSPOOL $CRONDIRS; then
	echo '0 5 * * * root /usr/sbin/aide  --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost' &gt;&gt; $CRONTAB
fi
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-aide_scan_notification:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_scan_notification_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_verify_acls" selected="false" severity="low">
                  <version>SLES-12-010520</version>
                  <title xml:lang="en-US">Configure AIDE to Verify Access Control Lists (ACLs)</title>
                  <description xml:lang="en-US">By default, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">acl</html:code> option is added to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">FIPSR</html:code> ruleset in AIDE.
If using a custom ruleset or the <html:code xmlns:html="http://www.w3.org/1999/xhtml">acl</html:code> option is missing, add <html:code xmlns:html="http://www.w3.org/1999/xhtml">acl</html:code>
to the appropriate ruleset.
For example, add <html:code xmlns:html="http://www.w3.org/1999/xhtml">acl</html:code> to the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/aide.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256</html:pre>
AIDE rules can be configured in multiple ways; this is merely one example that is already
configured by default.</description>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6b</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010520</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91851r1_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7.1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                  <rationale xml:lang="en-US">ACLs can provide permissions beyond those permitted through the file mode and must be
verified by the file integrity tools.</rationale>
                  <fix id="aide_verify_acls" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide

aide_conf="/etc/aide.conf"

groups=$(LC_ALL=C grep "^[A-Z]\+" $aide_conf | grep -v "^ALLXTRAHASHES" | cut -f1 -d '=' | tr -d ' ' | sort -u)

for group in $groups
do
	config=$(grep "^$group\s*=" $aide_conf | cut -f2 -d '=' | tr -d ' ')

	if ! [[ $config = *acl* ]]
	then
		if [[ -z $config ]]
		then
			config="acl"
		else
			config=$config"+acl"
		fi
	fi
	sed -i "s/^$group\s*=.*/$group = $config/g" $aide_conf
done
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-aide_verify_acls:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_verify_acls_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_verify_ext_attributes" selected="false" severity="medium">
                  <version>SLES-12-010530</version>
                  <title xml:lang="en-US">Configure AIDE to Verify Extended Attributes</title>
                  <description xml:lang="en-US">By default, the <html:code xmlns:html="http://www.w3.org/1999/xhtml">xattrs</html:code> option is added to the <html:code xmlns:html="http://www.w3.org/1999/xhtml">FIPSR</html:code> ruleset in AIDE.
If using a custom ruleset or the <html:code xmlns:html="http://www.w3.org/1999/xhtml">xattrs</html:code> option is missing, add <html:code xmlns:html="http://www.w3.org/1999/xhtml">xattrs</html:code>
to the appropriate ruleset.
For example, add <html:code xmlns:html="http://www.w3.org/1999/xhtml">xattrs</html:code> to the following line in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/aide.conf</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256</html:pre>
AIDE rules can be configured in multiple ways; this is merely one example that is already
configured by default.</description>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6b</reference>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010530</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91853r1_rule</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7.1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
                  <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
                  <rationale xml:lang="en-US">Extended attributes in file systems are used to contain arbitrary data and file metadata
with security implications.</rationale>
                  <fix id="aide_verify_ext_attributes" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide

aide_conf="/etc/aide.conf"

groups=$(LC_ALL=C grep "^[A-Z]\+" $aide_conf | grep -v "^ALLXTRAHASHES" | cut -f1 -d '=' | tr -d ' ' | sort -u)

for group in $groups
do
	config=$(grep "^$group\s*=" $aide_conf | cut -f2 -d '=' | tr -d ' ')

	if ! [[ $config = *xattrs* ]]
	then
		if [[ -z $config ]]
		then
			config="xattrs"
		else
			config=$config"+xattrs"
		fi
	fi
	sed -i "s/^$group\s*=.*/$group = $config/g" $aide_conf
done
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-aide_verify_ext_attributes:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_verify_ext_attributes_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="false" severity="medium">
                  <title xml:lang="en-US">Install AIDE</title>
                  <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">aide</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install aide</html:pre></description>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001744</reference>
                  <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.3.1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">13</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">14</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">7</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">8</reference>
                  <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
                  <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.1.3</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI01.06</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI02.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS01.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS03.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS04.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.03</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.05</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.07</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
                  <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.06</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 4.1</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 6.2</reference>
                  <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.4.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.14.2.7</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.15.2.1</reference>
                  <reference href="https://www.iso.org/standard/54534.html">A.8.2.3</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(3)</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">DE.CM-7</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
                  <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-3</reference>
                  <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-11.5</reference>
                  <rationale xml:lang="en-US">The AIDE package must be installed if it is to be available for integrity checking.</rationale>
                  <fix id="package_aide_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide
</fix>
                  <fix id="package_aide_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure aide is installed
  package:
    name: aide
    state: present
  tags:
    - package_aide_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
    - NIST-800-53-CM-3(d)
    - NIST-800-53-CM-3(e)
    - NIST-800-53-CM-6(d)
    - NIST-800-53-CM-6(3)
    - NIST-800-53-SC-28
    - NIST-800-53-SI-7
    - PCI-DSS-Req-11.5
    - CJIS-5.10.1.3
</fix>
                  <fix id="package_aide_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_aide

class install_aide {
  package { 'aide':
    ensure =&gt; 'installed',
  }
}
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-package_aide_installed:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-package_aide_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
                <Rule id="xccdf_org.ssgproject.content_rule_aide_check_audit_tools" selected="false" severity="medium">
                  <version>SLES-12-010540</version>
                  <title xml:lang="en-US">Configure AIDE to Verify the Audit Tools</title>
                  <description xml:lang="en-US">The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.</description>
                  <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010540</reference>
                  <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91855r1_rule</reference>
                  <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001496</reference>
                  <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(3)</reference>
                  <rationale xml:lang="en-US">Protecting the integrity of the tools used for auditing purposes is a
critical step toward ensuring the integrity of audit information. Audit
information includes all information (e.g., audit records, audit settings,
and audit reports) needed to successfully audit information system
activity.

Audit tools include but are not limited to vendor-provided and open-source
audit tools needed to successfully view and manipulate audit information
system activity and records. Audit tools include custom queries and report
generators.

It is not uncommon for attackers to replace the audit tools or inject code
into the existing tools to provide the capability to hide or erase system
activity from the audit logs.

To address this risk, audit tools must be cryptographically signed to
provide the capability to identify when the audit tools have been modified,
manipulated, or replaced. An example is a checksum hash of the file or
files.</rationale>
                  <fix id="aide_check_audit_tools" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install aide || exit 1

aide_conf="/etc/aide.conf"

tools="auditctl auditd ausearch aureport autrace audispd augenrules"

for tool in $tools ; do
    if ! grep -x -q -F "/usr/sbin/$tool p+i+n+u+g+s+b+acl+selinux+xattrs+sha512" "$aide_conf" ; then
        if grep -q "^/usr/sbin/$tool\s" "$aide_conf" ; then
            sed -i --follow-symlinks -E -e 's/^\/usr\/sbin\/'"$tool"'\s[^\n]*/\/usr\/sbin\/'"$tool"' p+i+n+u+g+s+b+acl+selinux+xattrs+sha512/' "$aide_conf" || exit 1
        else
            echo "/usr/sbin/$tool p+i+n+u+g+s+b+acl+selinux+xattrs+sha512" &gt;&gt; "$aide_conf" || exit 1
        fi
    fi
done

true
</fix>
                  <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                    <check-content-ref name="oval:ssg-aide_check_audit_tools:def:1" href="ssg-sle12-oval.xml"/>
                  </check>
                  <check system="http://scap.nist.gov/schema/ocil/2">
                    <check-content-ref name="ocil:ssg-aide_check_audit_tools_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
                  </check>
                </Rule>
              </Group>
              <Group id="xccdf_org.ssgproject.content_group_rpm_verification">
                <title xml:lang="en-US">Verify Integrity with RPM</title>
                <description xml:lang="en-US">The RPM package management system includes the ability
to verify the integrity of installed packages by comparing the
installed files with information about the files taken from the
package metadata stored in the RPM database. Although an attacker
could corrupt the RPM database (analogous to attacking the AIDE
database as described above), this check can still reveal
modification of important files. To list which files on the system differ from what is expected by the RPM database:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ rpm -qVa</html:pre>
See the man page for <html:code xmlns:html="http://www.w3.org/1999/xhtml">rpm</html:code> to see a complete explanation of each column.</description>
              </Group>
            </Group>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_sap">
            <title xml:lang="en-US">SAP Specific Requirement</title>
            <description xml:lang="en-US">SAP (Systems, Applications and Products in Data Processing) is enterprise
software to manage business operations and customer relations. The
following section contains SAP specific requirement that is not part
of standard or common OS setting.</description>
            <Value id="xccdf_org.ssgproject.content_value_var_accounts_authorized_local_users_regex" operator="pattern match" type="string" interactive="true">
              <title xml:lang="en-US">Accounts Authorized Local Users on the Operating System</title>
              <description xml:lang="en-US">List the user accounts that are authorized locally on the operating system. This list
includes both users requried by the operating system and by the installed applications.
Depending on the Operating System distribution, version, software groups and applications,
the user list is different and can be customized with scap-workbench.
OVAL regular expression is used for the user list.
The list starts with '^' and ends with '$' so that it matches exactly the
username, not any string that includes the username. Users are separated with '|'.
For example, three users: bin, oracle and sapadm are allowd, then the list is
<html:code xmlns:html="http://www.w3.org/1999/xhtml">^(bin|oracle|sapadm)$</html:code>. The user <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code> is the only user that is hard coded
in OVAL that is always allowed on the operating system.</description>
              <value selector="ol7forsap">^(root|bin|daemon|adm|lp|sync|shutdown|halt|mail|operator|games|ftp|nobody|pegasus|systemd-bus-proxy|systemd-network|dbus|polkitd|abrt|unbound|tss|libstoragemgmt|rpc|colord|usbmuxd$|pcp|saslauth|geoclue|setroubleshoot|rtkit|chrony|qemu|radvd|rpcuser|nfsnobody|pulse|gdm|gnome-initial-setup|postfix|avahi|ntp|sshd|tcpdump|oprofile|uuidd)$</value>
              <value selector="saponol7">^(root|bin|daemon|adm|lp|sync|shutdown|halt|mail|operator|games|ftp|nobody|pegasus|systemd-bus-proxy|systemd-network|dbus|polkitd|abrt|unbound|tss|libstoragemgmt|rpc|colord|usbmuxd$|pcp|saslauth|geoclue|setroubleshoot|rtkit|chrony|qemu|radvd|rpcuser|nfsnobody|pulse|gdm|gnome-initial-setup|postfix|avahi|ntp|sshd|tcpdump|oprofile|uuidd|[a-z][a-z0-9][a-z0-9]adm|ora[a-z][a-z0-9][a-z0-9]|sapadm|oracle)$</value>
              <value selector="none">^$</value>
            </Value>
            <Rule id="xccdf_org.ssgproject.content_rule_accounts_authorized_local_users" selected="false" severity="medium">
              <version>SLES-12-010630</version>
              <title xml:lang="en-US">Only Authorized Local User Accounts Exist on Operating System</title>
              <description xml:lang="en-US">Enterprise Application tends to use the server or virtual machine exclusively.
Besides the default operating system user, there should be only authorized local
users required by the installed softoware groups and applications that exist on
the operating system. The authorized user list can be customized in the refine
value variable <html:code xmlns:html="http://www.w3.org/1999/xhtml">var_accounts_authorized_local_users_regex</html:code>.
OVAL regular expression is used for the user list.
Configure the system so all accounts on the system are assigned to an active system,
application, or user account. Remove accounts that do not support approved system
activities or that allow for a normal user to perform administrative-level actions.
To remove unauthorized system accounts, use the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo userdel <html:i>unauthorized_user</html:i></html:pre></description>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010630</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91871r1_rule</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <rationale xml:lang="en-US">Accounts providing no operational purpose provide additional opportunities for
system compromise. Unnecessary accounts include user accounts for individuals not
requiring access to the system and application accounts for applications not installed
on the system.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-export export-name="oval:ssg-var_accounts_authorized_local_users_regex:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_authorized_local_users_regex"/>
                <check-content-ref name="oval:ssg-accounts_authorized_local_users:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-accounts_authorized_local_users_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_sudo">
            <title xml:lang="en-US">Sudo</title>
            <description xml:lang="en-US"><html:code xmlns:html="http://www.w3.org/1999/xhtml">Sudo</html:code>, which stands for \"su 'do'\", provides the ability to delegate authority
to certain users, groups of users, or system administrators. When configured for system
users and/or groups, <html:code xmlns:html="http://www.w3.org/1999/xhtml">Sudo</html:code> can allow a user or group to execute privileged commands
that normally only <html:code xmlns:html="http://www.w3.org/1999/xhtml">root</html:code> is allowed to execute.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
For more information on <html:code xmlns:html="http://www.w3.org/1999/xhtml">Sudo</html:code> and addition <html:code xmlns:html="http://www.w3.org/1999/xhtml">Sudo</html:code> configuration options, see
<html:b xmlns:html="http://www.w3.org/1999/xhtml"><html:a href="https://www.sudo.ws">https://www.sudo.ws</html:a></html:b>.</description>
            <Rule id="xccdf_org.ssgproject.content_rule_sudo_remove_no_authenticate" selected="false" severity="medium">
              <version>SLES-12-010110</version>
              <title xml:lang="en-US">Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate</title>
              <description xml:lang="en-US">The sudo <html:code xmlns:html="http://www.w3.org/1999/xhtml">!authenticate</html:code> option, when specified, allows a user to execute commands using
sudo without having to authenticate. This should be disabled by making sure that the
<html:code xmlns:html="http://www.w3.org/1999/xhtml">!authenticate</html:code> option does not exist in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers</html:code> configuration file or
any sudo configuration snippets in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers.d/</html:code>.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010110</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91763r2_rule</reference>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002038</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00156</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00157</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00158</reference>
              <reference href="">SRG-OS-000373-VMM-001470</reference>
              <reference href="">SRG-OS-000373-VMM-001480</reference>
              <reference href="">SRG-OS-000373-VMM-001490</reference>
              <rationale xml:lang="en-US">Without re-authentication, users may access resources or perform tasks for which they
do not have authorization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
When operating systems provide the capability to escalate a functional capability, it
is critical that the user re-authenticate.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-sudo_remove_no_authenticate:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sudo_remove_no_authenticate_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sudo_remove_nopasswd" selected="false" severity="medium">
              <version>SLES-12-010110</version>
              <title xml:lang="en-US">Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD</title>
              <description xml:lang="en-US">The sudo <html:code xmlns:html="http://www.w3.org/1999/xhtml">NOPASSWD</html:code> tag, when specified, allows a user to execute
commands using sudo without having to authenticate. This should be disabled
by making sure that the <html:code xmlns:html="http://www.w3.org/1999/xhtml">NOPASSWD</html:code> tag does not exist in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers</html:code> configuration file or any sudo configuration snippets
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers.d/</html:code>.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010110</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91763r2_rule</reference>
              <reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">NT28(R5)</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002038</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00156</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00157</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000373-GPOS-00158</reference>
              <reference href="">SRG-OS-000373-VMM-001470</reference>
              <reference href="">SRG-OS-000373-VMM-001480</reference>
              <reference href="">SRG-OS-000373-VMM-001490</reference>
              <rationale xml:lang="en-US">Without re-authentication, users may access resources or perform tasks for which they
do not have authorization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
When operating systems provide the capability to escalate a functional capability, it
is critical that the user re-authenticate.</rationale>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-sudo_remove_nopasswd:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sudo_remove_nopasswd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sudo_require_authentication" selected="false" severity="medium">
              <title xml:lang="en-US">Ensure Users Re-Authenticate for Privilege Escalation - sudo</title>
              <description xml:lang="en-US">The sudo <html:code xmlns:html="http://www.w3.org/1999/xhtml">NOPASSWD</html:code> and <html:code xmlns:html="http://www.w3.org/1999/xhtml">!authenticate</html:code> option, when
specified, allows a user to execute commands using sudo without having to
authenticate. This should be disabled by making sure that
<html:code xmlns:html="http://www.w3.org/1999/xhtml">NOPASSWD</html:code> and/or <html:code xmlns:html="http://www.w3.org/1999/xhtml">!authenticate</html:code> do not exist in
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers</html:code> configuration file or any sudo configuration snippets
in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers.d/</html:code>."</description>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">1</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">12</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">15</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">16</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">5</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.5.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.6</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.3.6.9</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.10</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.5</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 1.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.1.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.2.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.3.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.9.4.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.AC-7</reference>
              <rationale xml:lang="en-US">Without re-authentication, users may access resources or perform tasks for which they
do not have authorization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
When operating systems provide the capability to escalate a functional capability, it
is critical that the user re-authenticate.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sudo_require_authentication_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_sudo_vdsm_nopasswd" selected="false" severity="medium">
              <title xml:lang="en-US">Only the VDSM User Can Use sudo NOPASSWD</title>
              <description xml:lang="en-US">The sudo <html:code xmlns:html="http://www.w3.org/1999/xhtml">NOPASSWD</html:code> tag, when specified, allows a user to execute commands using sudo without having to authenticate. Only the <html:code xmlns:html="http://www.w3.org/1999/xhtml">vdsm</html:code> user should have this capability in any sudo configuration snippets in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/sudoers.d/</html:code>.</description>
              <rationale xml:lang="en-US">Without re-authentication, users may access resources or perform tasks for which they
do not have authorization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
When operating systems provide the capability to escalate a functional capability, it
is critical that the user re-authenticate.</rationale>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-sudo_vdsm_nopasswd_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
          <Group id="xccdf_org.ssgproject.content_group_updating">
            <title xml:lang="en-US">Updating Software</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">zypper</html:code> command line tool is used to install and
update software packages. The system also provides a graphical
software update tool in the <html:b xmlns:html="http://www.w3.org/1999/xhtml">System</html:b> menu, in the <html:b xmlns:html="http://www.w3.org/1999/xhtml">Administration</html:b> submenu,
called <html:b xmlns:html="http://www.w3.org/1999/xhtml">Software Update</html:b>.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
SUSE Linux Enterprise 12 systems contain an installed software catalog called
the RPM database, which records metadata of installed packages. Consistently using
<html:code xmlns:html="http://www.w3.org/1999/xhtml">zypper</html:code> or the graphical <html:b xmlns:html="http://www.w3.org/1999/xhtml">Software Update</html:b> for all software installation
allows for insight into the current inventory of installed software on the system.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/></description>
            <Rule id="xccdf_org.ssgproject.content_rule_clean_components_post_updating" selected="false" severity="low">
              <version>SLES-12-010570</version>
              <title xml:lang="en-US">Ensure zypper Removes Previous Package Versions</title>
              <description xml:lang="en-US"><html:code xmlns:html="http://www.w3.org/1999/xhtml">zypper</html:code> should be configured to remove previous software components after
new versions have been installed. To configure <html:code xmlns:html="http://www.w3.org/1999/xhtml">zypper</html:code> to remove the

previous software components after updating, set the <html:code xmlns:html="http://www.w3.org/1999/xhtml">solver.upgradeRemoveDroppedPackages</html:code>

to <html:code xmlns:html="http://www.w3.org/1999/xhtml">1</html:code> in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/zypp/zypp.conf</html:code>.</description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010570</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91859r2_rule</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">20</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.8</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002617</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.2.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2(6)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-11</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.RA-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-12</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000437-GPOS-00194</reference>
              <reference href="">SRG-OS-000437-VMM-001760</reference>
              <rationale xml:lang="en-US">Previous versions of software components that are not removed from the information
system after updates have been installed may be exploited by some adversaries.</rationale>
              <platform idref="cpe:/a:yum_or_zypper"/>
              <fix id="clean_components_post_updating" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append '/etc/zypp/zypp.conf' '^solver.upgradeRemoveDroppedPackages' 'true' '' '%s=%s'
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-clean_components_post_updating:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-clean_components_post_updating_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="false" severity="high">
              <version>SLES-12-010550</version>
              <title xml:lang="en-US">Ensure gpgcheck Enabled In Main zypper Configuration</title>
              <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">gpgcheck</html:code> option controls whether
RPM packages' signatures are always checked prior to installation.
To configure zypper to check package signatures before installing
them, ensure the following line appears in <html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/zypp/zypp.conf</html:code> in
the <html:code xmlns:html="http://www.w3.org/1999/xhtml">[main]</html:code> section:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml">gpgcheck = on
repo_gpgcheck = on
pkg_gpgcheck = on</html:pre></description>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010550</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91857r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.2.2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">11</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">2</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">3</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">9</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.4.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO01.06</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI06.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI10.05</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS06.02</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">3.4.8</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001749</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.308(a)(1)(ii)(D)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(b)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(c)(1)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(c)(2)</reference>
              <reference href="https://www.gpo.gov/fdsys/pkg/CFR-2007-title45-vol1/pdf/CFR-2007-title45-vol1-chapA-subchapC.pdf">164.312(e)(2)(i)</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.2</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.3.4.4.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.1</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.4</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 3.8</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116785">SR 7.6</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.11.2.4</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.2.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.5.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.4</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-5(3)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-11</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-6</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.DS-8</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-1</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FAU_GEN.1.1.c</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-6.2</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000366-GPOS-00153</reference>
              <reference href="">SRG-OS-000366-VMM-001430</reference>
              <reference href="">SRG-OS-000370-VMM-001460</reference>
              <reference href="">SRG-OS-000404-VMM-001650</reference>
              <rationale xml:lang="en-US">Changes to any software components can have significant effects on the
overall security of the operating system. This requirement ensures the
software has not been tampered with and that it has been provided by a
trusted vendor.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Accordingly, patches, service packs, device drivers, or operating system
components must be signed with a certificate recognized and approved by the
organization.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/>Verifying the authenticity of the software prior to installation
validates the integrity of the patch or upgrade received from a vendor.
This ensures the software has not been tampered with and that it has been
provided by a trusted vendor. Self-signed certificates are disallowed by
this requirement. Certificates used to verify the software must be from an
approved Certificate Authority (CA).</rationale>
              <platform idref="cpe:/a:yum_or_zypper"/>
              <fix id="ensure_gpgcheck_globally_activated" system="urn:xccdf:fix:script:sh"><sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append "/etc/zypp/zypp.conf" '^gpgcheck' 'on' ''
replace_or_append "/etc/zypp/zypp.conf" '^repo_gpgcheck' 'on' ''
<sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy"/>
replace_or_append "/etc/zypp/zypp.conf" '^pkg_gpgcheck' 'on' ''
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref name="oval:ssg-ensure_gpgcheck_globally_activated:def:1" href="ssg-sle12-oval.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
            <Rule id="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="false" severity="high">
              <version>SLES-12-010010</version>
              <title xml:lang="en-US">Ensure Software Patches Installed</title>
              <description xml:lang="en-US">
If the system is configured for online updates, invoking the following
command will list available security updates:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo zypper refresh &amp;&amp; sudo zypper list-patches -g security</html:pre>

<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
dictates.</description>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001227</reference>
              <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010010</reference>
              <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91743r2_rule</reference>
              <reference href="https://www.cisecurity.org/benchmark/suse_linux/">1.8</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">18</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">20</reference>
              <reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">4</reference>
              <reference href="https://www.fbi.gov/file-repository/cjis-security-policy-v5_5_20160601-2-1.pdf">5.10.4.1</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.02</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.03</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">APO12.04</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">BAI03.10</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.01</reference>
              <reference href="http://www.isaca.org/COBIT/Pages/default.aspx">DSS05.02</reference>
              <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-000366</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.12</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.7</reference>
              <reference href="https://www.isa.org/templates/one-column.aspx?pageid=111294&amp;productId=116731">4.2.3.9</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.12.6.1</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.14.2.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.16.1.3</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.2.2</reference>
              <reference href="https://www.iso.org/standard/54534.html">A.18.2.3</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2(c)</reference>
              <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">ID.RA-1</reference>
              <reference href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf">PR.IP-12</reference>
              <reference href="https://www.niap-ccevs.org/Profile/PP.cfm">FMT_MOF_EXT.1</reference>
              <reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">Req-6.2</reference>
              <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00227</reference>
              <reference href="">SRG-OS-000480-VMM-002000</reference>
              <rationale xml:lang="en-US">Installing software updates is a fundamental mitigation against
the exploitation of publicly-known vulnerabilities. If the most
recent security patches and updates are not installed, unauthorized
users may take advantage of weaknesses in the unpatched software. The
lack of prompt attention to patching could result in a system compromise.</rationale>
              <fix id="security_patches_up_to_date" system="urn:xccdf:fix:script:sh" reboot="true" complexity="low" disruption="high" strategy="patch">

zypper ref
zypper patch -g security -y
</fix>
              <fix id="security_patches_up_to_date" system="urn:xccdf:fix:script:ansible" reboot="true" complexity="low" disruption="high" strategy="patch">- name: Security patches are up to date
  package:
    name: '*'
    state: latest
  tags:
    - security_patches_up_to_date
    - high_severity
    - skip_ansible_lint
    - patch_strategy
    - low_complexity
    - high_disruption
    - reboot_required
    - NIST-800-53-SI-2
    - NIST-800-53-SI-2(c)
    - NIST-800-53-MA-1(b)
    - PCI-DSS-Req-6.2
    - CJIS-5.10.4.1
    - DISA-STIG-010010
</fix>
              <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
                <check-content-ref href="https://support.novell.com/security/oval/suse.linux.enterprise.12.xml"/>
              </check>
              <check system="http://scap.nist.gov/schema/ocil/2">
                <check-content-ref name="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
              </check>
            </Rule>
          </Group>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_kernel">
          <title xml:lang="en-US">Configuring the Linux Kernel</title>
          <description xml:lang="en-US">The following sections contain information on
security-relevant choices in the kernel configuration.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_blacklist_usb-storage" selected="false" severity="medium">
            <version>SLES-12-010580</version>
            <title xml:lang="en-US">Disable the usb-storage Kernel Module</title>
            <description xml:lang="en-US">To configure the system to prevent the usb-storage kernel module from
being loaded, add the following line to a file in the directory
<html:code xmlns:html="http://www.w3.org/1999/xhtml">/etc/modprobe.d</html:code>:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">blacklist usb-storage</html:pre></description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010580</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91861r2_rule</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001958</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-3</reference>
            <rationale xml:lang="en-US">Without identifying devices, unidentified or unknown devices may be
introduced, thereby facilitating malicious activity.

Peripherals include but are not limited to such devices as flash drives,
external storage, and printers.</rationale>
            <fix id="blacklist_usb-storage" system="urn:xccdf:fix:script:sh">
echo 'blacklist usb-storage' &gt;&gt; /etc/modprobe.d/50-blacklist.conf
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-blacklist_usb-storage:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-blacklist_usb-storage_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
        </Group>
        <Group id="xccdf_org.ssgproject.content_group_apparmor">
          <title xml:lang="en-US">AppArmor</title>
          <description xml:lang="en-US">Many security vulnerabilities result from bugs in trusted programs. A trusted
program runs with privileges that attackers want to possess. The program fails
to keep that trust if there is a bug in the program that allows the attacker to
acquire said privilege.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
AppArmor® is an application security solution designed specifically to apply
privilege confinement to suspect programs. AppArmor allows the administrator to
specify the domain of activities the program can perform by developing a
security profile. A security profile is a listing of files that the program may
access and the operations the program may perform. AppArmor secures
applications by enforcing good application behavior without relying on attack
signatures, so it can prevent attacks even if previously unknown
vulnerabilities are being exploited.
<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>
Fore more information on using AppArmor, see

    <html:a xmlns:html="http://www.w3.org/1999/xhtml" href="https://www.suse.com/documentation/sles-12/book_security/data/cha_apparmor_intro.html">https://www.suse.com/documentation/sles-12/book_security/data/cha_apparmor_intro.html</html:a>.</description>
          <Rule id="xccdf_org.ssgproject.content_rule_apparmor_configured" selected="false" severity="medium">
            <version>SLES-12-010600</version>
            <title xml:lang="en-US">Ensure AppArmor is Active and Configured</title>
            <description xml:lang="en-US">Verify that the SUSE operating system Apparmor tool is configured to
control whitelisted applications and user home directory access
control.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Check that <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_apparmor</html:code> is installed on the system with the following
command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># rpm -q pam_apparmor</html:pre>

Check that the "apparmor" daemon is running with the following command:

<html:pre xmlns:html="http://www.w3.org/1999/xhtml"># systemctl status apparmor.service | grep -i active

Active: active (exited) since Fri 2017-01-13 01:01:01 GMT; 1day 1h ago</html:pre>

<html:strong xmlns:html="http://www.w3.org/1999/xhtml">Note:</html:strong> <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_apparmor</html:code> must have properly configured
profiles. All configurations will be based on the actual system setup and
organization.  See the <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_apparmor</html:code> documentation for more
information on configuring profiles.</description>
            <reference href="http://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx">SLES-12-010600</reference>
            <reference href="http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx">SV-91865r2_rule</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-001774</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002165</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002233</reference>
            <reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">CCI-002235</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(4)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(8)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(10)</reference>
            <reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7(5)(b)</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000312-GPOS-00122</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000312-GPOS-00123SRG-OS-000312-GPOS-00124</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000324-GPOS-00125</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000326-GPOS-00126</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000370-GPOS-00155</reference>
            <reference href="http://iase.disa.mil/stigs/os/general/Pages/index.aspx">SRG-OS-000480-GPOS-00230</reference>
            <rationale xml:lang="en-US">Using a whitelist provides a configuration management method for allowing
the execution of only authorized software. Using only authorized software
decreases risk by limiting the number of potential vulnerabilities.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

The organization must identify authorized software programs and permit
execution of authorized software by adding each authorized program to the
"pam_apparmor" exception policy. The process used to identify software
programs that are authorized to execute on organizational information
systems is commonly referred to as whitelisting.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Verification of whitelisted software occurs prior to execution or at system
startup.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Users' home directories/folders may contain information of a sensitive
nature. Nonprivileged users should coordinate any sharing of information
with a System Administrator (SA) through shared resources.<html:br xmlns:html="http://www.w3.org/1999/xhtml"/><html:br xmlns:html="http://www.w3.org/1999/xhtml"/>

Apparmor can confine users to their home directory, not allowing them to
make any changes outside of their own home directories. Confining users to
their home directory will minimize the risk of sharing information.</rationale>
            <platform idref="cpe:/a:machine"/>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-apparmor_configured_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_service_apparmor_enabled" selected="false" severity="medium">
            <title xml:lang="en-US">Enable apparmor Service</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">apparmor</html:code> service loads AppArmor profiles into the kernel.

The <html:code xmlns:html="http://www.w3.org/1999/xhtml">apparmor</html:code> service can be enabled with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">$ sudo systemctl enable apparmor.service</html:pre></description>
            <rationale xml:lang="en-US">Protection of system integrity using AppArmor depends on this service being
started during boot.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="service_apparmor_enabled" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install 'apparmor-parser' || exit 1

SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" start 'apparmor.service'
"$SYSTEMCTL_EXEC" enable 'apparmor.service'
</fix>
            <fix id="service_apparmor_enabled" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Enable service apparmor
  service:
    name: apparmor
    enabled: 'yes'
    state: started
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - service_apparmor_enabled
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-service_apparmor_enabled:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-service_apparmor_enabled_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
          <Rule id="xccdf_org.ssgproject.content_rule_package_pam_apparmor_installed" selected="false" severity="medium">
            <title xml:lang="en-US">Install the pam_apparmor Package</title>
            <description xml:lang="en-US">The <html:code xmlns:html="http://www.w3.org/1999/xhtml">pam_apparmor</html:code> package can be installed with the following command:
<html:pre xmlns:html="http://www.w3.org/1999/xhtml">
$ sudo zypper install pam_apparmor</html:pre></description>
            <rationale xml:lang="en-US">Protection of system integrity using AppArmor depends on this package being
installed.</rationale>
            <platform idref="cpe:/a:machine"/>
            <fix id="package_pam_apparmor_installed" system="urn:xccdf:fix:script:sh" complexity="low" disruption="low" strategy="enable"><sub idref="xccdf_org.ssgproject.content_value_function_package_install" use="legacy"/>
package_install pam_apparmor
</fix>
            <fix id="package_pam_apparmor_installed" system="urn:xccdf:fix:script:ansible" complexity="low" disruption="low" strategy="enable">- name: Ensure pam_apparmor is installed
  package:
    name: pam_apparmor
    state: present
  when: ansible_virtualization_role != "guest" or ansible_virtualization_type != "docker"
  tags:
    - package_pam_apparmor_installed
    - medium_severity
    - enable_strategy
    - low_complexity
    - low_disruption
    - no_reboot_needed
</fix>
            <fix id="package_pam_apparmor_installed" system="urn:xccdf:fix:script:puppet" complexity="low" disruption="low" strategy="enable">include install_pam_apparmor

class install_pam_apparmor {
  package { 'pam_apparmor':
    ensure =&gt; 'installed',
  }
}
</fix>
            <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
              <check-content-ref name="oval:ssg-package_pam_apparmor_installed:def:1" href="ssg-sle12-oval.xml"/>
            </check>
            <check system="http://scap.nist.gov/schema/ocil/2">
              <check-content-ref name="ocil:ssg-package_pam_apparmor_installed_ocil:questionnaire:1" href="ssg-sle12-ocil.xml"/>
            </check>
          </Rule>
        </Group>
      </Group>
    </Benchmark>
  </ds:component>
  <ds:component id="scap_org.open-scap_comp_ssg-sle12-cpe-oval.xml" timestamp="2019-04-18T11:25:37">
    <ns0:oval_definitions xmlns:ns0="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:ns2="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:ns3="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ns4="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:ns5="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd         http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
      <ns0:generator>
        <ns2:product_name>combine_ovals.py from SCAP Security Guide</ns2:product_name>
        <ns2:product_version>ssg: [0, 1, 44], python: 3.7.2</ns2:product_version>
        <ns2:schema_version>5.11</ns2:schema_version>
        <ns2:timestamp>2019-04-18T09:25:33</ns2:timestamp>
      </ns0:generator>
      <ns0:definitions>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_centos6:def:1" version="2">
          <ns0:metadata>
            <ns0:title>CentOS 6</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:centos:centos:6" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      CentOS 6</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="CentOS6 is installed" test_ref="oval:ssg-test_centos6:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_centos7:def:1" version="2">
          <ns0:metadata>
            <ns0:title>CentOS 7</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:centos:centos:7" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      CentOS 7</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="CentOS7 is installed" test_ref="oval:ssg-test_centos7:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_centos8:def:1" version="2">
          <ns0:metadata>
            <ns0:title>CentOS 8</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:centos:centos:8" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      CentOS 8</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="CentOS8 is installed" test_ref="oval:ssg-test_centos8:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_debian8:def:1" version="3">
          <ns0:metadata>
            <ns0:title>Debian 8</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:debian:debian_linux:8" source="CPE"/>
            <ns0:description>The operating system installed on the system is Debian 8</ns0:description>
          </ns0:metadata>
          <ns0:criteria comment="current Debian version is Debian jessie" operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="Debian is installed" test_ref="oval:ssg-test_debian:tst:1"/>
            <ns0:criterion comment="Debian8 is installed" test_ref="oval:ssg-test_debian_8:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_fedora:def:1" version="3">
          <ns0:metadata>
            <ns0:title>Installed operating system is Fedora</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:fedoraproject:fedora:28" source="CPE"/>
            <ns0:description>The operating system installed on the system is Fedora</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="fedora-release RPM package is installed" test_ref="oval:ssg-test_fedora_release_rpm:tst:1"/>
            <ns0:criterion comment="CPE vendor is 'fedoraproject' and product is 'fedora'" test_ref="oval:ssg-test_fedora_vendor_product:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ol6_family:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Oracle Linux 6</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:oracle:linux:6" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Oracle Linux 6</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="Oracle Linux 6 System is installed" test_ref="oval:ssg-test_ol6_system:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ol7_family:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Oracle Linux 7</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:oracle:linux:7" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Oracle Linux 7</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="Oracle Linux 7 System is installed" test_ref="oval:ssg-test_ol7_system:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ol8_family:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Oracle Linux 8</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:oracle:linux:8" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Oracle Linux 8</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="Oracle Linux 8 System is installed" test_ref="oval:ssg-test_ol8_system:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse:def:1" version="1">
          <ns0:metadata>
            <ns0:title>openSUSE</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>The operating system installed on the system is openSUSE.</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="openSUSE is installed" test_ref="oval:ssg-test_opensuse_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse_leap15:def:1" version="1">
          <ns0:metadata>
            <ns0:title>openSUSE Leap 15</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:opensuse:leap:15.0" source="CPE"/>
            <ns0:description>The operating system installed on the system is openSUSE Leap 15.</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="openSUSE is installed" definition_ref="oval:ssg-installed_OS_is_opensuse:def:1"/>
            <ns0:criterion comment="openSUSE Leap 15 is installed" test_ref="oval:ssg-test_opensuse_leap15_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse_leap42:def:1" version="1">
          <ns0:metadata>
            <ns0:title>openSUSE Leap 42</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:opensuse:leap:42.1" source="CPE"/>
            <ns0:reference ref_id="cpe:/o:opensuse:leap:42.2" source="CPE"/>
            <ns0:reference ref_id="cpe:/o:opensuse:leap:42.3" source="CPE"/>
            <ns0:description>The operating system installed on the system is openSUSE Leap 42.</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="openSUSE is installed" definition_ref="oval:ssg-installed_OS_is_opensuse:def:1"/>
            <ns0:criterion comment="openSUSE Leap 42 is installed" test_ref="oval:ssg-test_opensuse_leap42_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Installed operating system is part of the Unix family</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>The operating system installed on the system is part of the Unix OS family</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_family:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_rhel6:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Red Hat Enterprise Linux 6</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Red Hat Enterprise Linux 6</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="RHEL 6 Client is installed" test_ref="oval:ssg-test_rhel_client:tst:1"/>
              <ns0:criterion comment="RHEL 6 Workstation is installed" test_ref="oval:ssg-test_rhel_workstation:tst:1"/>
              <ns0:criterion comment="RHEL 6 Server is installed" test_ref="oval:ssg-test_rhel_server:tst:1"/>
              <ns0:criterion comment="RHEL 6 Compute Node is installed" test_ref="oval:ssg-test_rhel_computenode:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_rhel7:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat Enterprise Linux 7</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:redhat:enterprise_linux:7" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Red Hat Enterprise Linux 7</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel7_unix_family:tst:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="RHEL 7 Client is installed" test_ref="oval:ssg-test_rhel7_client:tst:1"/>
              <ns0:criterion comment="RHEL 7 Workstation is installed" test_ref="oval:ssg-test_rhel7_workstation:tst:1"/>
              <ns0:criterion comment="RHEL 7 Server is installed" test_ref="oval:ssg-test_rhel7_server:tst:1"/>
              <ns0:criterion comment="RHEL 7 Compute Node is installed" test_ref="oval:ssg-test_rhel7_computenode:tst:1"/>
              <ns0:criteria comment="Red Hat Enterpise Virtualization Host is installed" operator="AND">
                <ns0:criterion comment="redhat-release-virtualization-host RPM package is installed" test_ref="oval:ssg-test_redhat_release_virtualization_host_rpm:tst:1"/>
                <ns0:criterion comment="Red Hat Enterpise Virtualization Host is based on RHEL 7" test_ref="oval:ssg-test_rhev_rhel_version:tst:1"/>
              </ns0:criteria>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_rhel8:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat Enterprise Linux 8</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:redhat:enterprise_linux:8" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Red Hat Enterprise Linux 8</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel8_unix_family:tst:1"/>
            <ns0:criterion comment="RHEL 8 is installed" test_ref="oval:ssg-test_rhel8:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_rhv4:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat Virtualization 4</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:redhat:virtualization:4" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Red Hat Virtualization Host 4 or Red Hat Enterprise Host.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="Red Hat Virtualization Host (RHVH)" test_ref="oval:ssg-test_rhvh4_version:tst:1"/>
              <ns0:criterion comment="Red Hat Virtualization Host is based on RHEL (RHELH)" test_ref="oval:ssg-test_rhelh4_version:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_sl6:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Scientific Linux 6</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Scientific Linux 6</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="Scientific Linux 6 is installed" test_ref="oval:ssg-test_sl6:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_sl7:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Scientific Linux 7</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:scientificlinux:scientificlinux:7" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Scientific Linux 7</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="Scientific Linux 7 is installed" test_ref="oval:ssg-test_sl7:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_sl8:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Scientific Linux 8</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:scientificlinux:scientificlinux:8" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Scientific Linux 8</ns0:description>
          </ns0:metadata>
          <ns0:criteria operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="Scientific Linux 8 is installed" test_ref="oval:ssg-test_sl8:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_sle11:def:1" version="1">
          <ns0:metadata>
            <ns0:title>SUSE Linux Enterprise 11</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:suse:linux_enterprise_server:11" source="CPE"/>
            <ns0:reference ref_id="cpe:/o:suse:linux_enterprise_desktop:11" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      SUSE Linux Enterprise 11.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_sle11_unix_family:tst:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="SLE 11 Desktop is installed" test_ref="oval:ssg-test_sle11_desktop:tst:1"/>
              <ns0:criterion comment="SLE 11 Server is installed" test_ref="oval:ssg-test_sle11_server:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_sle12:def:1" version="1">
          <ns0:metadata>
            <ns0:title>SUSE Linux Enterprise 12</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:suse:linux_enterprise_server:12" source="CPE"/>
            <ns0:reference ref_id="cpe:/o:suse:linux_enterprise_desktop:12" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      SUSE Linux Enterprise 12.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_sle12_unix_family:tst:1"/>
            <ns0:criteria operator="OR">
              <ns0:criterion comment="SLE 12 Desktop is installed" test_ref="oval:ssg-test_sle12_desktop:tst:1"/>
              <ns0:criterion comment="SLE 12 Server is installed" test_ref="oval:ssg-test_sle12_server:tst:1"/>
              <ns0:criterion comment="SLE 12 Server for SAP Applications is installed" test_ref="oval:ssg-test_sle12_sap:tst:1"/>
            </ns0:criteria>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Ubuntu</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>The operating system installed is an Ubuntu System</ns0:description>
          </ns0:metadata>
          <ns0:criteria comment="System is Ubuntu" operator="AND">
            <ns0:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1"/>
            <ns0:criterion comment="lsb-based distrib" test_ref="oval:ssg-test_lsb:tst:1"/>
            <ns0:criterion comment="Ubuntu is installed" test_ref="oval:ssg-test_ubuntu:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1404:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Ubuntu 1404</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:canonical:ubuntu_linux:14.04" source="CPE"/>
            <ns0:description>The operating system installed on the system is Ubuntu 1404</ns0:description>
          </ns0:metadata>
          <ns0:criteria comment="current Ubuntu version is Trusty" operator="AND">
            <ns0:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <ns0:criterion comment="Trusty is installed" test_ref="oval:ssg-test_ubuntu_trusty:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1604:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Ubuntu 1604</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:canonical:ubuntu_linux:16.04" source="CPE"/>
            <ns0:description>The operating system installed on the system is Ubuntu 1604</ns0:description>
          </ns0:metadata>
          <ns0:criteria comment="current Ubuntu version is Xenial" operator="AND">
            <ns0:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <ns0:criterion comment="Xenial is installed" test_ref="oval:ssg-test_ubuntu_xenial:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu1804:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Ubuntu 1804</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:canonical:ubuntu_linux:18.04" source="CPE"/>
            <ns0:description>The operating system installed on the system is Ubuntu 1804</ns0:description>
          </ns0:metadata>
          <ns0:criteria comment="current Ubuntu version is Bionic" operator="AND">
            <ns0:extend_definition comment="Ubuntu is installed" definition_ref="oval:ssg-installed_OS_is_ubuntu:def:1"/>
            <ns0:criterion comment="Bionic is installed" test_ref="oval:ssg-test_ubuntu_bionic:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_OS_is_wrlinux:def:1" version="1">
          <ns0:metadata>
            <ns0:title>WRLinux</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/o:windriver:wrlinux" source="CPE"/>
            <ns0:description>The operating system installed on the system is
      Wind River Linux</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_wrlinux:tst:1"/>
            <ns0:criterion comment="WRLinux is installed" test_ref="oval:ssg-test_wrlinux:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_app_is_ocp3:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat OpenShift Container Platform</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/a:redhat:openshift_container_platform:3.10" source="CPE"/>
            <ns0:reference ref_id="cpe:/a:redhat:openshift_container_platform:3.11" source="CPE"/>
            <ns0:description>The application installed installed on the system is
      OpenShift 3.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <ns0:criterion comment="OpenShift Node is installed" test_ref="oval:ssg-test_ocp3_node:tst:1"/>
            <ns0:criterion comment="OpenShift Hyperkube is installed" test_ref="oval:ssg-test_ocp3_hyperkube:tst:1"/>
            <ns0:criterion comment="Atomic OpenShift is installed" test_ref="oval:ssg-test_ocp3_atomic:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_app_is_rhosp13:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat OpenStack Platform</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/a:redhat:openstack:13.0" source="CPE"/>
            <ns0:description>The application installed installed on the system is
      Red Hat OpenStack Platform 13.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <ns0:criterion comment="OpenStack is installed" test_ref="oval:ssg-test_rhosp13_release:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_app_is_rhv4:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Red Hat Virtualization 4</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:reference ref_id="cpe:/a:redhat:virtualization:4" source="CPE"/>
            <ns0:description>The application installed installed on the system is
      Red Hat Virtualization 4.</ns0:description>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="RHEL7 OS installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1"/>
            <ns0:criterion comment="Red Hat Virtualization Manager (RHVM)" test_ref="oval:ssg-test_rhevm4_version:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_libuser_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package libuser is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package libuser is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:libuser" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package libuser is installed" test_ref="oval:ssg-test_env_has_libuser_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_nss-pam-ldapd_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package nss-pam-ldapd is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package nss-pam-ldapd is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:nss-pam-ldapd" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package nss-pam-ldapd is installed" test_ref="oval:ssg-test_env_has_nss-pam-ldapd_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_pam_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package pam is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package pam is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:pam" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package pam is installed" test_ref="oval:ssg-test_env_has_pam_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_shadow-utils_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package shadow-utils is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package shadow-utils is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:shadow-utils" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package shadow-utils is installed" test_ref="oval:ssg-test_env_has_shadow-utils_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_systemd_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package systemd is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package systemd is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:systemd" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package systemd is installed" test_ref="oval:ssg-test_env_has_systemd_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_yum_or_zypper_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package yum or zypper is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package yum or zypper is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:yum_or_zypper" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria operator="OR">
            <ns0:criterion comment="Package yum is installed" test_ref="oval:ssg-test_env_yumorzypper_has_yum_installed:tst:1"/>
            <ns0:criterion comment="Package zypper is installed" test_ref="oval:ssg-test_env_has_zypper_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_has_yum_package:def:1" version="1">
          <ns0:metadata>
            <ns0:title>Package yum is installed</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Checks if package yum is installed.</ns0:description>
            <ns0:reference ref_id="cpe:/a:yum" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:criterion comment="Package yum is installed" test_ref="oval:ssg-test_env_has_yum_installed:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_is_a_container:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Check if the scan target is a container</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Check for presence of files characterizing container filesystems.</ns0:description>
            <ns0:reference ref_id="cpe:/a:container" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria operator="OR">
            <ns0:criterion comment="Check if /.dockerenv exists" test_ref="oval:ssg-test_installed_env_is_a_docker_container:tst:1"/>
            <ns0:criterion comment="Check if /run/.containerenv exists" test_ref="oval:ssg-test_installed_env_is_a_podman_container:tst:1"/>
          </ns0:criteria>
        </ns0:definition>
        <ns0:definition class="inventory" id="oval:ssg-installed_env_is_a_machine:def:1" version="2">
          <ns0:metadata>
            <ns0:title>Check if the scan target is a machine</ns0:title>
            <ns0:affected family="unix">
              <ns0:platform>SUSE Linux Enterprise 12</ns0:platform>
            </ns0:affected>
            <ns0:description>Check for absence of files characterizing container filesystems.</ns0:description>
            <ns0:reference ref_id="cpe:/a:machine" source="CPE"/>
          </ns0:metadata>
          <ns0:criteria>
            <ns0:extend_definition comment="If environment is not a container, it is machine" definition_ref="oval:ssg-installed_env_is_a_container:def:1" negate="true"/>
          </ns0:criteria>
        </ns0:definition>
      </ns0:definitions>
      <ns0:tests>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 6" id="oval:ssg-test_centos6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_centos6:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_centos6:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 7" id="oval:ssg-test_centos7:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_centos7:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_centos7:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 8" id="oval:ssg-test_centos8:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_centos8:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_centos8:ste:1"/>
        </ns3:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/debian_version exists" id="oval:ssg-test_debian:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_debian:obj:1"/>
        </ns4:file_test>
        <ns5:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Debian version" id="oval:ssg-test_debian_8:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_debian_8:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns3:rpminfo_test check="all" check_existence="only_one_exists" comment="fedora-release RPM package is installed" id="oval:ssg-test_fedora_release_rpm:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-object_fedora_release_rpm:obj:1"/>
        </ns3:rpminfo_test>
        <ns5:textfilecontent54_test check="all" comment="CPE vendor is 'fedoraproject' and 'product' is fedora" id="oval:ssg-test_fedora_vendor_product:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_fedora_vendor_product:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 6" id="oval:ssg-test_ol6_system:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ol6_system:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ol6_system:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 7" id="oval:ssg-test_ol7_system:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ol7_system:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ol7_system:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="oraclelinux-release is version 8" id="oval:ssg-test_ol8_system:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ol8_system:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ol8_system:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE is installed" id="oval:ssg-test_opensuse_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_opensuse_installed:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_opensuse_installed:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE Leap 15 is installed" id="oval:ssg-test_opensuse_leap15_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_opensuse_leap15_installed:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_opensuse_leap15_installed:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="openSUSE Leap 42 is installed" id="oval:ssg-test_opensuse_leap42_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_opensuse_leap42_installed:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_opensuse_leap42_installed:ste:1"/>
        </ns3:rpminfo_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="Test installed OS is part of the unix family" id="oval:ssg-test_unix_family:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-object_unix_family:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_unix_family:ste:1"/>
        </ns5:family_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-client is version 6" id="oval:ssg-test_rhel_client:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel_client:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel_client:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 6" id="oval:ssg-test_rhel_workstation:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel_workstation:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel_workstation:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 6" id="oval:ssg-test_rhel_server:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel_server:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel_server:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 6" id="oval:ssg-test_rhel_computenode:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel_computenode:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel_computenode:ste:1"/>
        </ns3:rpminfo_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel7_unix_family:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel7_unix_family:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel7_unix_family:ste:1"/>
        </ns5:family_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-client is version 7" id="oval:ssg-test_rhel7_client:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel7_client:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel7_client:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 7" id="oval:ssg-test_rhel7_workstation:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel7_workstation:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel7_workstation:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 7" id="oval:ssg-test_rhel7_server:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel7_server:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel7_server:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 7" id="oval:ssg-test_rhel7_computenode:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel7_computenode:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel7_computenode:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="only_one_exists" comment="redhat-release-virtualization-host RPM package is installed" id="oval:ssg-test_redhat_release_virtualization_host_rpm:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_redhat_release_virtualization_host_rpm:obj:1"/>
        </ns3:rpminfo_test>
        <ns5:textfilecontent54_test check="all" comment="RHEVH base RHEL is version 7" id="oval:ssg-test_rhev_rhel_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhevh_rhel_version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhevh_rhel_version:ste:1"/>
        </ns5:textfilecontent54_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel8_unix_family:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhel8_unix_family:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhel8_unix_family:ste:1"/>
        </ns5:family_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release is version 8" id="oval:ssg-test_rhel8:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhel8:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhel8:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="only_one_exists" comment="redhat-release-virtualization-host RPM package is installed" id="oval:ssg-test_rhvh4_version:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhvh4_version:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhvh4_version:ste:1"/>
        </ns3:rpminfo_test>
        <ns5:textfilecontent54_test check="all" comment="RHEVH base RHEL is version 7" id="oval:ssg-test_rhelh4_version:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_rhelh4_version:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_rhelh4_version:ste:1"/>
        </ns5:textfilecontent54_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 6" id="oval:ssg-test_sl6:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sl6:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sl6:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 7" id="oval:ssg-test_sl7:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sl7:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sl7:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 8" id="oval:ssg-test_sl8:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sl8:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sl8:ste:1"/>
        </ns3:rpminfo_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_sle11_unix_family:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle11_unix_family:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle11_unix_family:ste:1"/>
        </ns5:family_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sled-release is version 6" id="oval:ssg-test_sle11_desktop:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle11_desktop:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle11_desktop:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-release is version 6" id="oval:ssg-test_sle11_server:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle11_server:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle11_server:ste:1"/>
        </ns3:rpminfo_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_sle12_unix_family:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_sle12_unix_family:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_sle12_unix_family:ste:1"/>
        </ns5:family_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sled-release is version 6" id="oval:ssg-test_sle12_desktop:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle12_desktop:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle12_desktop:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-release is version 6" id="oval:ssg-test_sle12_server:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle12_server:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle12_server:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sles-sap is version 12" id="oval:ssg-test_sle12_sap:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_sle12_sap:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_sle12_sap:ste:1"/>
        </ns3:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="/etc/lsb-release exists" id="oval:ssg-test_lsb:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_lsb:obj:1"/>
        </ns4:file_test>
        <ns5:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu" id="oval:ssg-test_ubuntu:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ubuntu:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns5:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_trusty:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ubuntu_trusty:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns5:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_xenial:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ubuntu_xenial:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns5:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check Ubuntu version" id="oval:ssg-test_ubuntu_bionic:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_ubuntu_bionic:obj:1"/>
        </ns5:textfilecontent54_test>
        <ns5:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_unix_wrlinux:tst:1" version="1">
          <ns5:object object_ref="oval:ssg-obj_unix_wrlinux:obj:1"/>
          <ns5:state state_ref="oval:ssg-state_unix_wrlinux:ste:1"/>
        </ns5:family_test>
        <ns4:file_test check="all" check_existence="at_least_one_exists" comment="Test presence of /etc/wrlinux-release." id="oval:ssg-test_wrlinux:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-obj_test_wrlinux:obj:1"/>
        </ns4:file_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift is version 3" id="oval:ssg-test_ocp3_atomic:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ocp3_atomic:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ocp3_atomic:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift-node is version 3" id="oval:ssg-test_ocp3_node:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ocp3_node:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ocp3_node:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="atomic-openshift-hyperkube is version 3" id="oval:ssg-test_ocp3_hyperkube:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_ocp3_hyperkube:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_ocp3_hyperkube:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="OpenStack is version 13" id="oval:ssg-test_rhosp13_release:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhosp13_release:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhosp13_release:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="rhevm4-appliance is installed" id="oval:ssg-test_rhevm4_version:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_rhevm4_version:obj:1"/>
          <ns3:state state_ref="oval:ssg-state_rhevm4_version:ste:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package libuser installed" id="oval:ssg-test_env_has_libuser_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_libuser_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package nss-pam-ldapd installed" id="oval:ssg-test_env_has_nss-pam-ldapd_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_nss-pam-ldapd_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package pam installed" id="oval:ssg-test_env_has_pam_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_pam_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package shadow-utils installed" id="oval:ssg-test_env_has_shadow-utils_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_shadow-utils_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package systemd installed" id="oval:ssg-test_env_has_systemd_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_systemd_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package yum installed" id="oval:ssg-test_env_yumorzypper_has_yum_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_yumorzypper_has_yum_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package zypper installed" id="oval:ssg-test_env_has_zypper_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_zypper_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns3:rpminfo_test check="all" check_existence="at_least_one_exists" comment="system has package yum installed" id="oval:ssg-test_env_has_yum_installed:tst:1" version="1">
          <ns3:object object_ref="oval:ssg-obj_env_has_yum_installed:obj:1"/>
        </ns3:rpminfo_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check if /.dockerenv exists" id="oval:ssg-test_installed_env_is_a_docker_container:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_installed_env_is_a_docker_container:obj:1"/>
        </ns4:file_test>
        <ns4:file_test check="all" check_existence="all_exist" comment="Check if /run/.containerenv exists" id="oval:ssg-test_installed_env_is_a_podman_container:tst:1" version="1">
          <ns4:object object_ref="oval:ssg-object_installed_env_is_a_podman_container:obj:1"/>
        </ns4:file_test>
      </ns0:tests>
      <ns0:objects>
        <ns3:rpminfo_object id="oval:ssg-obj_centos6:obj:1" version="1">
          <ns3:name>centos-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_centos7:obj:1" version="1">
          <ns3:name>centos-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_centos8:obj:1" version="1">
          <ns3:name>centos-release</ns3:name>
        </ns3:rpminfo_object>
        <ns4:file_object comment="check /etc/debian_version file" id="oval:ssg-obj_debian:obj:1" version="1">
          <ns4:filepath>/etc/debian_version</ns4:filepath>
        </ns4:file_object>
        <ns5:textfilecontent54_object comment="Check Debian version" id="oval:ssg-obj_debian_8:obj:1" version="1">
          <ns5:filepath>/etc/debian_version</ns5:filepath>
          <ns5:pattern operation="pattern match">^8.[0-9]+$</ns5:pattern>
          <ns5:instance datatype="int">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns3:rpminfo_object id="oval:ssg-object_fedora_release_rpm:obj:1" version="1">
          <ns3:name>fedora-release</ns3:name>
        </ns3:rpminfo_object>
        <ns5:textfilecontent54_object id="oval:ssg-object_fedora_vendor_product:obj:1" version="1">
          <ns5:filepath>/etc/system-release-cpe</ns5:filepath>
          <ns5:pattern operation="pattern match">^cpe:\/o:fedoraproject:fedora:[\d]+$</ns5:pattern>
          <ns5:instance datatype="int" operation="equals">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ol6_system:obj:1" version="1">
          <ns3:name>oraclelinux-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ol7_system:obj:1" version="1">
          <ns3:name>oraclelinux-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ol8_system:obj:1" version="1">
          <ns3:name>oraclelinux-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_opensuse_installed:obj:1" version="1">
          <ns3:name>openSUSE-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_opensuse_leap15_installed:obj:1" version="1">
          <ns3:name>openSUSE-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_opensuse_leap42_installed:obj:1" version="1">
          <ns3:name>openSUSE-release</ns3:name>
        </ns3:rpminfo_object>
        <ns5:family_object id="oval:ssg-object_unix_family:obj:1" version="1"/>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel_client:obj:1" version="1">
          <ns3:name>redhat-release-client</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel_workstation:obj:1" version="1">
          <ns3:name>redhat-release-workstation</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel_server:obj:1" version="1">
          <ns3:name>redhat-release-server</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel_computenode:obj:1" version="1">
          <ns3:name>redhat-release-computenode</ns3:name>
        </ns3:rpminfo_object>
        <ns5:family_object id="oval:ssg-obj_rhel7_unix_family:obj:1" version="1"/>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel7_client:obj:1" version="1">
          <ns3:name>redhat-release-client</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel7_workstation:obj:1" version="1">
          <ns3:name>redhat-release-workstation</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel7_server:obj:1" version="1">
          <ns3:name>redhat-release-server</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel7_computenode:obj:1" version="1">
          <ns3:name>redhat-release-computenode</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_redhat_release_virtualization_host_rpm:obj:1" version="1">
          <ns3:name>redhat-release-virtualization-host</ns3:name>
        </ns3:rpminfo_object>
        <ns5:textfilecontent54_object id="oval:ssg-obj_rhevh_rhel_version:obj:1" version="1">
          <ns5:filepath>/etc/redhat-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^Red Hat Enterprise Linux release (\d)\.\d+$</ns5:pattern>
          <ns5:instance datatype="int" operation="greater than or equal">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns5:family_object id="oval:ssg-obj_rhel8_unix_family:obj:1" version="1"/>
        <ns3:rpminfo_object id="oval:ssg-obj_rhel8:obj:1" version="1">
          <ns3:name>redhat-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhvh4_version:obj:1" version="1">
          <ns3:name>redhat-release-virtualization-host</ns3:name>
        </ns3:rpminfo_object>
        <ns5:textfilecontent54_object id="oval:ssg-obj_rhelh4_version:obj:1" version="1">
          <ns5:filepath>/etc/redhat-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^Red Hat Enterprise Linux release (\d)\.\d+$</ns5:pattern>
          <ns5:instance datatype="int" operation="greater than or equal">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sl6:obj:1" version="1">
          <ns3:name>sl-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sl7:obj:1" version="1">
          <ns3:name>sl-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sl8:obj:1" version="1">
          <ns3:name>sl-release</ns3:name>
        </ns3:rpminfo_object>
        <ns5:family_object id="oval:ssg-obj_sle11_unix_family:obj:1" version="1"/>
        <ns3:rpminfo_object id="oval:ssg-obj_sle11_desktop:obj:1" version="1">
          <ns3:name>sled-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sle11_server:obj:1" version="1">
          <ns3:name>sles-release</ns3:name>
        </ns3:rpminfo_object>
        <ns5:family_object id="oval:ssg-obj_sle12_unix_family:obj:1" version="1"/>
        <ns3:rpminfo_object id="oval:ssg-obj_sle12_desktop:obj:1" version="1">
          <ns3:name>sled-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sle12_server:obj:1" version="1">
          <ns3:name>sles-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_sle12_sap:obj:1" version="1">
          <ns3:name>SLES_SAP-release</ns3:name>
        </ns3:rpminfo_object>
        <ns4:file_object comment="check /etc/lsb-release file" id="oval:ssg-obj_lsb:obj:1" version="1">
          <ns4:filepath>/etc/lsb-release</ns4:filepath>
        </ns4:file_object>
        <ns5:textfilecontent54_object comment="Check Ubuntu" id="oval:ssg-obj_ubuntu:obj:1" version="1">
          <ns5:filepath>/etc/lsb-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^DISTRIB_ID=Ubuntu$</ns5:pattern>
          <ns5:instance datatype="int">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns5:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_trusty:obj:1" version="1">
          <ns5:filepath>/etc/lsb-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^DISTRIB_CODENAME=trusty$</ns5:pattern>
          <ns5:instance datatype="int">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns5:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_xenial:obj:1" version="1">
          <ns5:filepath>/etc/lsb-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^DISTRIB_CODENAME=xenial$</ns5:pattern>
          <ns5:instance datatype="int">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns5:textfilecontent54_object comment="Check Ubuntu version" id="oval:ssg-obj_ubuntu_bionic:obj:1" version="1">
          <ns5:filepath>/etc/lsb-release</ns5:filepath>
          <ns5:pattern operation="pattern match">^DISTRIB_CODENAME=bionic$</ns5:pattern>
          <ns5:instance datatype="int">1</ns5:instance>
        </ns5:textfilecontent54_object>
        <ns5:family_object id="oval:ssg-obj_unix_wrlinux:obj:1" version="1"/>
        <ns4:file_object id="oval:ssg-obj_test_wrlinux:obj:1" version="1">
          <ns4:filepath>/etc/wrlinux-release</ns4:filepath>
        </ns4:file_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ocp3_atomic:obj:1" version="1">
          <ns3:name>atomic-openshift</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ocp3_node:obj:1" version="1">
          <ns3:name>atomic-openshift-node</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_ocp3_hyperkube:obj:1" version="1">
          <ns3:name>atomic-openshift-hyperkube</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhosp13_release:obj:1" version="1">
          <ns3:name>rhosp-release</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_rhevm4_version:obj:1" version="1">
          <ns3:name>rhvm-appliance</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_libuser_installed:obj:1" version="1">
          <ns3:name>libuser</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_nss-pam-ldapd_installed:obj:1" version="1">
          <ns3:name>nss-pam-ldapd</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_pam_installed:obj:1" version="1">
          <ns3:name>pam</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_shadow-utils_installed:obj:1" version="1">
          <ns3:name>shadow-utils</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_systemd_installed:obj:1" version="1">
          <ns3:name>systemd</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_yumorzypper_has_yum_installed:obj:1" version="1">
          <ns3:name>yum</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_zypper_installed:obj:1" version="1">
          <ns3:name>zypper</ns3:name>
        </ns3:rpminfo_object>
        <ns3:rpminfo_object id="oval:ssg-obj_env_has_yum_installed:obj:1" version="1">
          <ns3:name>yum</ns3:name>
        </ns3:rpminfo_object>
        <ns4:file_object comment="Check file /.dockerenv" id="oval:ssg-object_installed_env_is_a_docker_container:obj:1" version="1">
          <ns4:filepath datatype="string">/.dockerenv</ns4:filepath>
        </ns4:file_object>
        <ns4:file_object comment="Check file /run/.containerenv" id="oval:ssg-object_installed_env_is_a_podman_container:obj:1" version="1">
          <ns4:filepath datatype="string">/run/.containerenv</ns4:filepath>
        </ns4:file_object>
      </ns0:objects>
      <ns0:states>
        <ns3:rpminfo_state id="oval:ssg-state_centos6:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_centos7:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_centos8:ste:1" version="1">
          <ns3:version operation="pattern match">^8.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_ol6_system:ste:1" version="1">
          <ns3:version operation="pattern match">^6Server$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_ol7_system:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_ol8_system:ste:1" version="1">
          <ns3:version operation="pattern match">^8.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_opensuse_installed:ste:1" version="1">
          <ns3:name operation="pattern match">openSUSE-release</ns3:name>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_opensuse_leap15_installed:ste:1" version="1">
          <ns3:version operation="pattern match">^15.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_opensuse_leap42_installed:ste:1" version="1">
          <ns3:version operation="pattern match">^42.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:family_state id="oval:ssg-state_unix_family:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel_client:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel_workstation:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel_server:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel_computenode:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:family_state id="oval:ssg-state_rhel7_unix_family:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel7_client:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel7_workstation:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel7_server:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel7_computenode:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:textfilecontent54_state id="oval:ssg-state_rhevh_rhel_version:ste:1" version="1">
          <ns5:subexpression operation="pattern match">7</ns5:subexpression>
        </ns5:textfilecontent54_state>
        <ns5:family_state id="oval:ssg-state_rhel8_unix_family:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhel8:ste:1" version="1">
          <ns3:version operation="pattern match">^8.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhvh4_version:ste:1" version="1">
          <ns3:version operation="pattern match">^4.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:textfilecontent54_state id="oval:ssg-state_rhelh4_version:ste:1" version="1">
          <ns5:subexpression operation="pattern match">7</ns5:subexpression>
        </ns5:textfilecontent54_state>
        <ns3:rpminfo_state id="oval:ssg-state_sl6:ste:1" version="1">
          <ns3:version operation="pattern match">^6.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_sl7:ste:1" version="1">
          <ns3:version operation="pattern match">^7.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_sl8:ste:1" version="1">
          <ns3:version operation="pattern match">^8.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:family_state id="oval:ssg-state_sle11_unix_family:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_sle11_desktop:ste:1" version="1">
          <ns3:version operation="pattern match">^11.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_sle11_server:ste:1" version="1">
          <ns3:version operation="pattern match">^11.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:family_state id="oval:ssg-state_sle12_unix_family:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_sle12_desktop:ste:1" version="1">
          <ns3:version operation="pattern match">^12.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_sle12_server:ste:1" version="1">
          <ns3:version operation="pattern match">^12.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_sle12_sap:ste:1" version="1">
          <ns3:version operation="pattern match">^12.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns5:family_state id="oval:ssg-state_unix_wrlinux:ste:1" version="1">
          <ns5:family>unix</ns5:family>
        </ns5:family_state>
        <ns3:rpminfo_state id="oval:ssg-state_ocp3_atomic:ste:1" version="1">
          <ns3:version operation="pattern match">^3.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_ocp3_node:ste:1" version="1">
          <ns3:version operation="pattern match">^3.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_ocp3_hyperkube:ste:1" version="1">
          <ns3:version operation="pattern match">^3.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhosp13_release:ste:1" version="1">
          <ns3:version operation="pattern match">^13.*$</ns3:version>
        </ns3:rpminfo_state>
        <ns3:rpminfo_state id="oval:ssg-state_rhevm4_version:ste:1" version="1">
          <ns3:version operation="pattern match">^4.*$</ns3:version>
        </ns3:rpminfo_state>
      </ns0:states>
    </ns0:oval_definitions>
  </ds:component>
  <ds:component id="scap_org.open-scap_comp_ssg-sle12-cpe-dictionary.xml" timestamp="2019-04-18T11:25:37">
    <ns0:cpe-list xmlns:ns0="http://cpe.mitre.org/dictionary/2.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://cpe.mitre.org/dictionary/2.0 http://cpe.mitre.org/files/cpe-dictionary_2.1.xsd">
      <ns0:cpe-item name="cpe:/o:suse:linux_enterprise_server:12">
        <ns0:title xml:lang="en-us">SUSE Linux Enterprise Server 12</ns0:title>
        <ns0:check href="ssg-sle12-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_sle12:def:1</ns0:check>
      </ns0:cpe-item>
      <ns0:cpe-item name="cpe:/o:suse:sles_sap:12">
        <ns0:title xml:lang="en-us">SUSE Linux Enterprise Server 12</ns0:title>
        <ns0:check href="ssg-sle12-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_sle12:def:1</ns0:check>
      </ns0:cpe-item>
      <ns0:cpe-item name="cpe:/o:suse:linux_enterprise_desktop:12">
        <ns0:title xml:lang="en-us">SUSE Linux Enterprise Desktop 12</ns0:title>
        <ns0:check href="ssg-sle12-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_sle12:def:1</ns0:check>
      </ns0:cpe-item>
      <ns0:cpe-item name="cpe:/a:container">
        <ns0:title xml:lang="en-us">Container</ns0:title>
        <ns0:check href="ssg-sle12-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_env_is_a_container:def:1</ns0:check>
      </ns0:cpe-item>
      <ns0:cpe-item name="cpe:/a:machine">
        <ns0:title xml:lang="en-us">Bare-metal or Virtual Machine</ns0:title>
        <ns0:check href="ssg-sle12-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_env_is_a_machine:def:1</ns0:check>
      </ns0:cpe-item>
    </ns0:cpe-list>
  </ds:component>
</ds:data-stream-collection>
