diff --git a/.gitignore b/.gitignore
index 20df2b2..ea97346 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1 +1 @@
-SOURCES/scap-security-guide-0.1.25.tar.gz
+SOURCES/scap-security-guide-0.1.30.tar.gz
diff --git a/.scap-security-guide.metadata b/.scap-security-guide.metadata
index 7038a45..2d6f46b 100644
--- a/.scap-security-guide.metadata
+++ b/.scap-security-guide.metadata
@@ -1 +1 @@
-1dc2e85ad80098968485bc75050697abc40143d4 SOURCES/scap-security-guide-0.1.25.tar.gz
+6630e157fce94380bc4610538b1fb8cccfaf5f57 SOURCES/scap-security-guide-0.1.30.tar.gz
diff --git a/SOURCES/scap-security-guide-0.1.19-rhel7-drop-cpuspeed-rule-since-obsolete.patch b/SOURCES/scap-security-guide-0.1.19-rhel7-drop-cpuspeed-rule-since-obsolete.patch
deleted file mode 100644
index fac759b..0000000
--- a/SOURCES/scap-security-guide-0.1.19-rhel7-drop-cpuspeed-rule-since-obsolete.patch
+++ /dev/null
@@ -1,26 +0,0 @@
---- scap-security-guide-0.1.19/RHEL/7/input/services/base.xml.orig 2014-09-29 07:29:50.979356661 -0400
-+++ scap-security-guide-0.1.19/RHEL/7/input/services/base.xml 2014-09-29 07:30:23.749395788 -0400
-@@ -91,23 +91,6 @@ service is not necessary.
-
-
-
--
--Disable CPU Speed (cpuspeed)
--The cpuspeed service can adjust the clock speed of supported CPUs based upon
--the current processing load thereby conserving power and reducing heat.
--
--
--
--The cpuspeed service is only necessary if adjusting the CPU clock speed
--provides benefit. Traditionally this has included laptops (to enhance battery life),
--but may also apply to server or desktop environments where conserving power is
--highly desirable or necessary.
--
--
--
--
--
--
-
- Enable IRQ Balance (irqbalance)
- The irqbalance service optimizes the balance between
diff --git a/SOURCES/scap-security-guide-0.1.25-add-adjtimex-settimeofday-stime-rhel7-remediation.patch b/SOURCES/scap-security-guide-0.1.25-add-adjtimex-settimeofday-stime-rhel7-remediation.patch
deleted file mode 100644
index b0b28d6..0000000
--- a/SOURCES/scap-security-guide-0.1.25-add-adjtimex-settimeofday-stime-rhel7-remediation.patch
+++ /dev/null
@@ -1,135 +0,0 @@
-From bb68e10170f532fed47277d76eb74f4fad498039 Mon Sep 17 00:00:00 2001
-From: Jan Lieskovsky
-Date: Fri, 24 Jul 2015 16:21:04 +0200
-Subject: [PATCH] [Enhancement] [RHEL/7] New RHEL-7 audit time remediations for
- following rules: * audit_rules_time_adjtimex, *
- audit_rules_time_settimeofday, and * audit_rules_time_stime
-
-Testing report:
---------------
-Verified manually on RHEL-7 host the changes are working fine (in both
-scenarios, expected rule not at all present in audit.rules configuration,
-or expected rule partially present in audit.rules configuration)
----
- .../input/fixes/bash/audit_rules_time_adjtimex.sh | 32 ++++++++++++++++++++++
- .../fixes/bash/audit_rules_time_settimeofday.sh | 32 ++++++++++++++++++++++
- RHEL/7/input/fixes/bash/audit_rules_time_stime.sh | 32 ++++++++++++++++++++++
- 3 files changed, 96 insertions(+)
- create mode 100644 RHEL/7/input/fixes/bash/audit_rules_time_adjtimex.sh
- create mode 100644 RHEL/7/input/fixes/bash/audit_rules_time_settimeofday.sh
- create mode 100644 RHEL/7/input/fixes/bash/audit_rules_time_stime.sh
-
-diff --git a/RHEL/7/input/fixes/bash/audit_rules_time_adjtimex.sh b/RHEL/7/input/fixes/bash/audit_rules_time_adjtimex.sh
-new file mode 100644
-index 0000000..43fdfbb
---- /dev/null
-+++ b/RHEL/7/input/fixes/bash/audit_rules_time_adjtimex.sh
-@@ -0,0 +1,32 @@
-+
-+# Include source function library.
-+. /usr/share/scap-security-guide/remediation_functions
-+
-+# Perform the remediation for the syscall rule
-+# Retrieve hardware architecture of the underlying system
-+[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
-+
-+for ARCH in "${RULE_ARCHS[@]}"
-+do
-+
-+ PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
-+
-+ # Create expected audit group and audit rule form for particular system call & architecture
-+ if [ ${ARCH} = "b32" ]
-+ then
-+ # stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
-+ # so append it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\|stime\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
-+ elif [ ${ARCH} = "b64" ]
-+ then
-+ # stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
-+ # therefore don't add it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
-+ fi
-+
-+ # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
-+ fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+ fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+done
-diff --git a/RHEL/7/input/fixes/bash/audit_rules_time_settimeofday.sh b/RHEL/7/input/fixes/bash/audit_rules_time_settimeofday.sh
-new file mode 100644
-index 0000000..43fdfbb
---- /dev/null
-+++ b/RHEL/7/input/fixes/bash/audit_rules_time_settimeofday.sh
-@@ -0,0 +1,32 @@
-+
-+# Include source function library.
-+. /usr/share/scap-security-guide/remediation_functions
-+
-+# Perform the remediation for the syscall rule
-+# Retrieve hardware architecture of the underlying system
-+[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
-+
-+for ARCH in "${RULE_ARCHS[@]}"
-+do
-+
-+ PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
-+
-+ # Create expected audit group and audit rule form for particular system call & architecture
-+ if [ ${ARCH} = "b32" ]
-+ then
-+ # stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
-+ # so append it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\|stime\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
-+ elif [ ${ARCH} = "b64" ]
-+ then
-+ # stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
-+ # therefore don't add it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
-+ fi
-+
-+ # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
-+ fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+ fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+done
-diff --git a/RHEL/7/input/fixes/bash/audit_rules_time_stime.sh b/RHEL/7/input/fixes/bash/audit_rules_time_stime.sh
-new file mode 100644
-index 0000000..43fdfbb
---- /dev/null
-+++ b/RHEL/7/input/fixes/bash/audit_rules_time_stime.sh
-@@ -0,0 +1,32 @@
-+
-+# Include source function library.
-+. /usr/share/scap-security-guide/remediation_functions
-+
-+# Perform the remediation for the syscall rule
-+# Retrieve hardware architecture of the underlying system
-+[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
-+
-+for ARCH in "${RULE_ARCHS[@]}"
-+do
-+
-+ PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
-+
-+ # Create expected audit group and audit rule form for particular system call & architecture
-+ if [ ${ARCH} = "b32" ]
-+ then
-+ # stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
-+ # so append it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\|stime\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
-+ elif [ ${ARCH} = "b64" ]
-+ then
-+ # stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
-+ # therefore don't add it to the list of time group system calls to be audited
-+ GROUP="\(adjtimex\|settimeofday\)"
-+ FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
-+ fi
-+
-+ # Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
-+ fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+ fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
-+done
diff --git a/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch b/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch
deleted file mode 100644
index f4b2d39..0000000
--- a/SOURCES/scap-security-guide-0.1.25-centos-menu-branding.patch
+++ /dev/null
@@ -1,249 +0,0 @@
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml 2015-12-08 07:06:53.929233818 -0600
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml 2015-12-08 07:30:17.747857532 -0600
-@@ -1,5 +1,5 @@
-
--Draft PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7
-+Draft PCI-DSS v3 Control Baseline for CentOS Linux 7
- This is a *draft* profile for PCI-DSS v3
-
-
-@@ -54,20 +54,20 @@
-
-
-
--
--
-+
-+
-
--
--
--
--
-+
-+
-+
-+
-
-
-
--
-+
-
--
--
-+
-+
-
-
-
-@@ -77,19 +77,19 @@
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_downstream_disabled scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_downstream_disabled
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_downstream_disabled 2015-08-19 10:54:02.000000000 -0500
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_downstream_disabled 2015-12-08 07:31:08.882743495 -0600
-@@ -1,5 +1,5 @@
-
--Draft PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7
-+Draft PCI-DSS v3 Control Baseline for CentOS Linux 7
- This is a *draft* profile for PCI-DSS v3
-
-
-@@ -54,21 +54,21 @@
-
-
-
--
--
-+
-+
-
-
--
--
--
--
-+
-+
-+
-+
-
-
-
--
-+
-
--
--
-+
-+
-
-
-
-@@ -78,19 +78,19 @@
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule 2015-12-08 07:06:53.928233822 -0600
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml.rhel7_pcidss_drop_rpm_verify_permissions_rule 2015-12-08 07:31:31.811691561 -0600
-@@ -1,5 +1,5 @@
-
--Draft PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7
-+Draft PCI-DSS v3 Control Baseline for CentOS Linux 7
- This is a *draft* profile for PCI-DSS v3
-
-
-@@ -54,21 +54,21 @@
-
-
-
--
--
-+
-+
-
-
--
--
--
--
-+
-+
-+
-+
-
-
-
--
-+
-
--
--
-+
-+
-
-
-
-@@ -78,19 +78,19 @@
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-
-
--
-+
-
-
-
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/rht-ccp.xml scap-security-guide-0.1.25/RHEL/7/input/profiles/rht-ccp.xml
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/rht-ccp.xml 2015-08-19 10:54:02.000000000 -0500
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/rht-ccp.xml 2015-12-08 07:33:09.162465695 -0600
-@@ -1,6 +1,6 @@
-
--Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
--This is a *draft* SCAP profile for Red Hat Certified Cloud Providers
-+CentOS Profile for Cloud Providers (CPCP)
-+This is a *draft* SCAP profile for CentOS Cloud Providers
-
-
-
-@@ -98,11 +98,11 @@
-
-
-
--This requirement does not apply against Red Hat Enterprise Linux 7:
-+This requirement does not apply against CentOS Linux 7:
- see: https://github.com/OpenSCAP/scap-security-guide/issues/66 for details.
-
-
--This requirement does not apply against Red Hat Enterprise Linux 7:
-+This requirement does not apply against CentOS Linux 7:
- see: https://github.com/OpenSCAP/scap-security-guide/issues/67 for details.
-
-
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/standard.xml scap-security-guide-0.1.25/RHEL/7/input/profiles/standard.xml
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/standard.xml 2015-08-19 10:54:02.000000000 -0500
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/standard.xml 2015-12-08 07:27:34.453179300 -0600
-@@ -1,6 +1,6 @@
-
- Standard System Security Profile
--This profile contains rules to ensure standard security base of Red Hat Enterprise Linux 7 system.
-+This profile contains rules to ensure standard security base of CentOS Linux 7 system.
-
-
-
-diff -uNrp scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml scap-security-guide-0.1.25/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml
---- scap-security-guide-0.1.25.orig/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml 2015-08-19 10:54:02.000000000 -0500
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/stig-rhel7-server-upstream.xml 2015-12-08 07:33:44.930380583 -0600
-@@ -1,5 +1,5 @@
-
--Pre-release Draft STIG for Red Hat Enterprise Linux 7 Server
-+Pre-release Draft STIG for CentOS Linux 7 Server
- This profile is being developed under the DoD consensus model to become a STIG in coordination with DISA FSO.
-
-
-
-
--
-+
-
-
-
-
--
-+
-
-
-
-@@ -77,9 +77,9 @@
-
-
-
--
--
--
-+
-+
-+
-
-
-
diff --git a/SOURCES/scap-security-guide-0.1.25-downstream-rhel7-pci-dss-drop-rpm-verify-permissions-rule.patch b/SOURCES/scap-security-guide-0.1.25-downstream-rhel7-pci-dss-drop-rpm-verify-permissions-rule.patch
deleted file mode 100644
index 5a1c0f9..0000000
--- a/SOURCES/scap-security-guide-0.1.25-downstream-rhel7-pci-dss-drop-rpm-verify-permissions-rule.patch
+++ /dev/null
@@ -1,10 +0,0 @@
---- scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml.orig 2015-10-02 10:52:46.420297787 +0200
-+++ scap-security-guide-0.1.25/RHEL/7/input/profiles/pci-dss.xml 2015-10-02 10:54:06.309879851 +0200
-@@ -56,7 +56,6 @@
-
-
-
--
-
-
-
diff --git a/SOURCES/scap-security-guide-0.1.30-downstream-rhbz#1357019.patch b/SOURCES/scap-security-guide-0.1.30-downstream-rhbz#1357019.patch
new file mode 100644
index 0000000..a3129fa
--- /dev/null
+++ b/SOURCES/scap-security-guide-0.1.30-downstream-rhbz#1357019.patch
@@ -0,0 +1,108 @@
+From bfaac3332c7e06b4252746f6da514fd44e74b0e6 Mon Sep 17 00:00:00 2001
+From: Jan Lieskovsky
+Date: Wed, 10 Aug 2016 15:47:58 +0200
+Subject: [PATCH] [BugFix] [RHEL/7] Rewrite RHEL-7 remediation for
+ 'smartcard_auth' rule since per downstream bug:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1357019
+
+we can't use 'authconfig' binary direct call, because it will
+discard the changes as performed and required by other remediation
+scripts also touching /etc/pam.d/system-auth{,-ac} file
+
+Therefore return to previous version updating necessary files
+directly via 'sed' tool (rather than using 'authconfig' binary)
+
+Note: While on the rule also update XCCDF link providing further
+info how to setup smartcard auth (since the current one returns
+HTTP 404 Not Found)
+---
+ RHEL/7/input/xccdf/system/accounts/physical.xml | 2 +-
+ RHEL/7/input/remediations/bash/smartcard_auth.sh | 61 +++++++++++++++++++++++--
+ 2 files changed, 58 insertions(+), 5 deletions(-)
+
+diff --git a/RHEL/7/input/xccdf/system/accounts/physical.xml b/RHEL/7/input/xccdf/system/accounts/physical.xml
+index b3ac250..d229469 100644
+--- a/RHEL/7/input/xccdf/system/accounts/physical.xml
++++ b/RHEL/7/input/xccdf/system/accounts/physical.xml
+@@ -375,7 +375,7 @@ is not enabled by default and must be enabled in the system settings.
+
+ To enable smart card authentication, consult the documentation at:
+