Blob Blame History Raw
diff --git a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
index bab42044b..547bd002d 100644
--- a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
+++ b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
@@ -18,7 +18,7 @@ rationale: |-
     individual system users can be uniquely traced to those users so they
     can be held accountable for their actions.
 
-severity: high
+severity: medium
 
 requires:
     - package_audit_installed
diff --git a/linux_os/guide/system/selinux/selinux_policytype/rule.yml b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
index d861f5f9e..b57012df9 100644
--- a/linux_os/guide/system/selinux/selinux_policytype/rule.yml
+++ b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
@@ -25,7 +25,7 @@ rationale: |-
     is completed, the system should be reconfigured to
     <tt>{{{ xccdf_value("var_selinux_policy_name") }}}</tt>.
 
-severity: high
+severity: medium
 
 identifiers:
     cce@rhel6: CCE-26875-5
diff --git a/linux_os/guide/system/selinux/selinux_state/rule.yml b/linux_os/guide/system/selinux/selinux_state/rule.yml
index 94ef78d57..d971c1d03 100644
--- a/linux_os/guide/system/selinux/selinux_state/rule.yml
+++ b/linux_os/guide/system/selinux/selinux_state/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
     prevent them from causing damage to the system or further elevating their
     privileges.
 
-severity: high
+severity: medium
 
 identifiers:
     cce@rhel6: CCE-26969-6