Blame SOURCES/scap-security-guide-0.1.54-update_stig_severity-PR_6417.patch

fe0dde
diff --git a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
fe0dde
index bab42044b..547bd002d 100644
fe0dde
--- a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
fe0dde
+++ b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
fe0dde
@@ -18,7 +18,7 @@ rationale: |-
fe0dde
     individual system users can be uniquely traced to those users so they
fe0dde
     can be held accountable for their actions.
fe0dde
 
fe0dde
-severity: high
fe0dde
+severity: medium
fe0dde
 
fe0dde
 requires:
fe0dde
     - package_audit_installed
fe0dde
diff --git a/linux_os/guide/system/selinux/selinux_policytype/rule.yml b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
fe0dde
index d861f5f9e..b57012df9 100644
fe0dde
--- a/linux_os/guide/system/selinux/selinux_policytype/rule.yml
fe0dde
+++ b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
fe0dde
@@ -25,7 +25,7 @@ rationale: |-
fe0dde
     is completed, the system should be reconfigured to
fe0dde
     <tt>{{{ xccdf_value("var_selinux_policy_name") }}}</tt>.
fe0dde
 
fe0dde
-severity: high
fe0dde
+severity: medium
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26875-5
fe0dde
diff --git a/linux_os/guide/system/selinux/selinux_state/rule.yml b/linux_os/guide/system/selinux/selinux_state/rule.yml
fe0dde
index 94ef78d57..d971c1d03 100644
fe0dde
--- a/linux_os/guide/system/selinux/selinux_state/rule.yml
fe0dde
+++ b/linux_os/guide/system/selinux/selinux_state/rule.yml
fe0dde
@@ -16,7 +16,7 @@ rationale: |-
fe0dde
     prevent them from causing damage to the system or further elevating their
fe0dde
     privileges.
fe0dde
 
fe0dde
-severity: high
fe0dde
+severity: medium
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26969-6