Blame SOURCES/scap-security-guide-0.1.30-centos-menu-branding-2.patch

721d24
diff -uNrp scap-security-guide-0.1.30.orig/RHEL/7/input/guide.xml scap-security-guide-0.1.30/RHEL/7/input/guide.xml
721d24
--- scap-security-guide-0.1.30.orig/RHEL/7/input/guide.xml	2016-06-22 12:56:46.000000000 +0000
721d24
+++ scap-security-guide-0.1.30/RHEL/7/input/guide.xml	2016-12-04 12:58:05.537287951 +0000
721d24
@@ -2,9 +2,9 @@
721d24
 <Benchmark xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:dc="http://purl.org/dc/elements/1.1/" id="RHEL-7" xsi:schemaLocation="http://checklists.nist.gov/xccdf/1.1 xccdf-1.1.4.xsd" style="SCAP_1.1" resolved="false" xml:lang="en-US" >
721d24
 
721d24
 <status date="2011-12-20">draft</status>
721d24
-<title>Guide to the Secure Configuration of Red Hat Enterprise Linux 7</title>
721d24
+<title>Guide to the Secure Configuration of CentOS Linux 7</title>
721d24
 <description>This guide presents a catalog of security-relevant
721d24
-configuration settings for Red Hat Enterprise Linux 7 formatted in the
721d24
+configuration settings for CentOS Linux 7 formatted in the
721d24
 eXtensible Configuration Checklist Description Format (XCCDF).  
721d24
 
721d24
 
721d24
@@ -22,7 +22,7 @@ providing baselines that meet a diverse
721d24
 XCCDF Profiles, which are selections of items that form checklists and
721d24
 can be used as baselines, are available with this guide.  They can be
721d24
 processed, in an automated fashion, with tools that support the Security
721d24
-Content Automation Protocol (SCAP).  The DISA STIG for Red Hat Enterprise Linux 7 is one example of
721d24
+Content Automation Protocol (SCAP).  The DISA STIG for CentOS Linux 7 is one example of
721d24
 a baseline created from this guidance.
721d24
 </description>
721d24
 <notice id="terms_of_use">Do not attempt to implement any of the settings in
721d24
@@ -32,7 +32,7 @@ other parties, and makes no guarantees,
721d24
 quality, reliability, or any other characteristic.</notice>
721d24
 
721d24
 <front-matter>The SCAP Security Guide Project
https://fedorahosted.org/scap-security-guide</front-matter>
721d24
-<rear-matter>Red Hat and Red Hat Enterprise Linux are either registered
721d24
+<rear-matter>Red Hat and Red Hat Enterprise  Linux are either registered
721d24
 trademarks or trademarks of Red Hat, Inc. in the United States and other
721d24
 countries. All other names are registered trademarks or trademarks of their
721d24
 respective companies.</rear-matter>
721d24
diff -uNrp scap-security-guide-0.1.30.orig/RHEL/7/input/intro/intro.xml scap-security-guide-0.1.30/RHEL/7/input/intro/intro.xml
721d24
--- scap-security-guide-0.1.30.orig/RHEL/7/input/intro/intro.xml	2016-06-22 12:56:46.000000000 +0000
721d24
+++ scap-security-guide-0.1.30/RHEL/7/input/intro/intro.xml	2016-12-04 13:02:13.903282198 +0000
721d24
@@ -3,7 +3,7 @@
721d24
 <description>
721d24
 
721d24
 The purpose of this guidance is to provide security configuration
721d24
-recommendations and baselines for the Red Hat Enterprise Linux (RHEL) 7 operating
721d24
+recommendations and baselines for the CentOS Linux 7 operating
721d24
 system. The guidance provided here should be applicable to all variants
721d24
 (Desktop, Server, Advanced Platform) of the product. Recommended
721d24
 settings for the basic operating system are provided, as well as for many
721d24
@@ -33,7 +33,7 @@ to passive monitoring. Whenever practica
721d24
 such data exist, they should be applied. Even if data is expected to
721d24
 be transmitted only over a local network, it should still be encrypted.
721d24
 Encrypting authentication data, such as passwords, is particularly
721d24
-important. Networks of Red Hat Enterprise Linux 7 machines can and should be configured
721d24
+important. Networks of CentOS Linux 7 machines can and should be configured
721d24
 so that no unencrypted authentication data is ever transmitted between
721d24
 machines.
721d24
 </description>
721d24
@@ -44,7 +44,7 @@ machines.
721d24
 <title>Minimize Software to Minimize Vulnerability</title>
721d24
 <description>
721d24
 The simplest way to avoid vulnerabilities in software is to avoid
721d24
-installing that software. On RHEL, the RPM Package Manager (originally
721d24
+installing that software. On CentOS, the RPM Package Manager (originally
721d24
 Red Hat Package Manager, abbreviated RPM) allows for careful management of
721d24
 the set of software packages installed on a system. Installed software
721d24
 contributes to system vulnerability in several ways. Packages that