Blame SOURCES/scap-security-guide-0.1.61-rhel8_stig_v1r5-PR_8050.patch

38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh
38a2c0
new file mode 100644
38a2c0
index 00000000000..1c151a1ec1a
38a2c0
--- /dev/null
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/bash/shared.sh
38a2c0
@@ -0,0 +1,5 @@
38a2c0
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhv
38a2c0
+
38a2c0
+if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" "/etc/pam.d/password-auth"; then
38a2c0
+	sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" "/etc/pam.d/password-auth"
38a2c0
+fi
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml
38a2c0
new file mode 100644
38a2c0
index 00000000000..24fdbe4c1d4
38a2c0
--- /dev/null
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/oval/shared.xml
38a2c0
@@ -0,0 +1,19 @@
38a2c0
+<def-group>
38a2c0
+  <definition class="compliance" id="set_password_hashing_algorithm_passwordauth" version="1">
38a2c0
+    {{{ oval_metadata("The password hashing algorithm should be set correctly in /etc/pam.d/password-auth.") }}}
38a2c0
+    <criteria operator="AND">
38a2c0
+      <criterion test_ref="test_pam_unix_passwordauth_sha512" />
38a2c0
+    </criteria>
38a2c0
+  </definition>
38a2c0
+
38a2c0
+  <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/password-auth for correct settings" id="test_pam_unix_passwordauth_sha512" version="1">
38a2c0
+    <ind:object object_ref="object_pam_unix_passwordauth_sha512" />
38a2c0
+  </ind:textfilecontent54_test>
38a2c0
+
38a2c0
+  <ind:textfilecontent54_object comment="check /etc/pam.d/password-auth for correct settings" id="object_pam_unix_passwordauth_sha512" version="1">
38a2c0
+      <ind:filepath>/etc/pam.d/password-auth</ind:filepath>
38a2c0
+      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:sufficient))[\s]+pam_unix\.so[\s]+.*sha512.*$</ind:pattern>
38a2c0
+    <ind:instance datatype="int">1</ind:instance>
38a2c0
+  </ind:textfilecontent54_object>
38a2c0
+
38a2c0
+</def-group>
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml
38a2c0
new file mode 100644
38a2c0
index 00000000000..9375269161d
38a2c0
--- /dev/null
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/rule.yml
38a2c0
@@ -0,0 +1,72 @@
38a2c0
+documentation_complete: true
38a2c0
+
38a2c0
+prodtype: fedora,rhel7,rhel8,rhel9,rhv4
38a2c0
+
38a2c0
+title: "Set PAM's Password Hashing Algorithm - password-auth"
38a2c0
+
38a2c0
+description: |-
38a2c0
+    The PAM system service can be configured to only store encrypted
38a2c0
+    representations of passwords. In
38a2c0
+    <tt>/etc/pam.d/password-auth</tt>,
38a2c0
+    the
38a2c0
+    <tt>password</tt> section of the file controls which PAM modules execute
38a2c0
+    during a password change. Set the <tt>pam_unix.so</tt> module in the
38a2c0
+    <tt>password</tt> section to include the argument <tt>sha512</tt>, as shown
38a2c0
+    below:
38a2c0
+    
38a2c0
+    
password    sufficient    pam_unix.so sha512 other arguments...
38a2c0
+    
38a2c0
+    This will help ensure when local users change their passwords, hashes for
38a2c0
+    the new passwords will be generated using the SHA-512 algorithm. This is
38a2c0
+    the default.
38a2c0
+
38a2c0
+rationale: |-
38a2c0
+    Passwords need to be protected at all times, and encryption is the standard
38a2c0
+    method for protecting passwords. If passwords are not encrypted, they can
38a2c0
+    be plainly read (i.e., clear text) and easily compromised. Passwords that
38a2c0
+    are encrypted with a weak algorithm are no more protected than if they are
38a2c0
+    kepy in plain text.
38a2c0
+    

38a2c0
+    This setting ensures user and group account administration utilities are
38a2c0
+    configured to store only encrypted representations of passwords.
38a2c0
+    Additionally, the <tt>crypt_style</tt> configuration option ensures the use
38a2c0
+    of a strong hashing algorithm that makes password cracking attacks more
38a2c0
+    difficult.
38a2c0
+
38a2c0
+severity: medium
38a2c0
+
38a2c0
+identifiers:
38a2c0
+    cce@rhel7: CCE-85943-9
38a2c0
+    cce@rhel8: CCE-85945-4
38a2c0
+    cce@rhel9: CCE-85946-2
38a2c0
+
38a2c0
+references:
38a2c0
+    anssi: BP28(R32)
38a2c0
+    cis-csc: 1,12,15,16,5
38a2c0
+    cis@rhel7: 5.4.3
38a2c0
+    cis@rhel8: 5.4.4
38a2c0
+    cjis: 5.6.2.2
38a2c0
+    cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
38a2c0
+    cui: 3.13.11
38a2c0
+    disa: CCI-000196
38a2c0
+    isa-62443-2009: 4.3.3.2.2,4.3.3.5.1,4.3.3.5.2,4.3.3.6.1,4.3.3.6.2,4.3.3.6.3,4.3.3.6.4,4.3.3.6.5,4.3.3.6.6,4.3.3.6.7,4.3.3.6.8,4.3.3.6.9,4.3.3.7.2,4.3.3.7.4
38a2c0
+    isa-62443-2013: 'SR 1.1,SR 1.10,SR 1.2,SR 1.3,SR 1.4,SR 1.5,SR 1.7,SR 1.8,SR 1.9,SR 2.1'
38a2c0
+    ism: 0418,1055,1402
38a2c0
+    iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
38a2c0
+    nist: IA-5(c),IA-5(1)(c),CM-6(a)
38a2c0
+    nist-csf: PR.AC-1,PR.AC-6,PR.AC-7
38a2c0
+    pcidss: Req-8.2.1
38a2c0
+    srg: SRG-OS-000073-GPOS-00041
38a2c0
+    stigid@rhel7: RHEL-07-010200
38a2c0
+    stigid@rhel8: RHEL-08-010160
38a2c0
+    vmmsrg: SRG-OS-000480-VMM-002000
38a2c0
+
38a2c0
+ocil_clause: 'it does not'
38a2c0
+
38a2c0
+ocil: |-
38a2c0
+    Inspect the <tt>password</tt> section of <tt>/etc/pam.d/password-auth</tt>
38a2c0
+    and ensure that the <tt>pam_unix.so</tt> module includes the argument
38a2c0
+    <tt>sha512</tt>:
38a2c0
+    
$ grep sha512 /etc/pam.d/password-auth
38a2c0
+
38a2c0
+platform: pam
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh
38a2c0
new file mode 100644
38a2c0
index 00000000000..a924fe5bd97
38a2c0
--- /dev/null
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/correct.pass.sh
38a2c0
@@ -0,0 +1,5 @@
38a2c0
+#!/bin/bash
38a2c0
+
38a2c0
+if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" "/etc/pam.d/password-auth"; then
38a2c0
+	sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" "/etc/pam.d/password-auth"
38a2c0
+fi
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh
38a2c0
new file mode 100644
38a2c0
index 00000000000..68e925a645f
38a2c0
--- /dev/null
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_passwordauth/tests/missing.fail.sh
38a2c0
@@ -0,0 +1,3 @@
38a2c0
+#!/bin/bash
38a2c0
+
38a2c0
+sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/sha512//g" "/etc/pam.d/password-auth"
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
38a2c0
index 542ea521a6c..e7503feeecb 100644
38a2c0
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/bash/shared.sh
38a2c0
@@ -1,7 +1,9 @@
38a2c0
-# platform = multi_platform_wrlinux,multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_sle
38a2c0
+# platform = multi_platform_wrlinux,multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv
38a2c0
 
38a2c0
 AUTH_FILES[0]="/etc/pam.d/system-auth"
38a2c0
+{{%- if product == "rhel7" %}}
38a2c0
 AUTH_FILES[1]="/etc/pam.d/password-auth"
38a2c0
+{{%- endif %}}
38a2c0
 
38a2c0
 for pamFile in "${AUTH_FILES[@]}"
38a2c0
 do
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
38a2c0
index d76b6f80c0c..a754a84df6c 100644
38a2c0
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/oval/shared.xml
38a2c0
@@ -3,6 +3,9 @@
38a2c0
     {{{ oval_metadata("The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.") }}}
38a2c0
     <criteria operator="AND">
38a2c0
       <criterion test_ref="test_pam_unix_sha512" />
38a2c0
+      {{%- if product == "rhel7" %}}
38a2c0
+      <extend_definition comment="check /etc/pam.d/password-auth for correct settings" definition_ref="set_password_hashing_algorithm_passwordauth" />
38a2c0
+      {{%- endif %}}
38a2c0
     </criteria>
38a2c0
   </definition>
38a2c0
 
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
38a2c0
index 13da9dd4086..59fb48e93b5 100644
38a2c0
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/rule.yml
38a2c0
@@ -70,7 +70,7 @@ references:
38a2c0
     stigid@ol7: OL07-00-010200
38a2c0
     stigid@ol8: OL08-00-010160
38a2c0
     stigid@rhel7: RHEL-07-010200
38a2c0
-    stigid@rhel8: RHEL-08-010160
38a2c0
+    stigid@rhel8: RHEL-08-010159
38a2c0
     stigid@sle12: SLES-12-010230
38a2c0
     stigid@sle15: SLES-15-020170
38a2c0
     vmmsrg: SRG-OS-000480-VMM-002000
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
38a2c0
index 7e481760670..fb9feec4d27 100644
38a2c0
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/correct.pass.sh
38a2c0
@@ -1,7 +1,9 @@
38a2c0
 #!/bin/bash
38a2c0
 
38a2c0
 AUTH_FILES[0]="/etc/pam.d/system-auth"
38a2c0
+{{%- if product == "rhel7" %}}
38a2c0
 AUTH_FILES[1]="/etc/pam.d/password-auth"
38a2c0
+{{%- endif %}}
38a2c0
 
38a2c0
 for pamFile in "${AUTH_FILES[@]}"
38a2c0
 do
38a2c0
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
38a2c0
index 09bb82dd1d7..2f35381d475 100644
38a2c0
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
38a2c0
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_systemauth/tests/missing.fail.sh
38a2c0
@@ -1,7 +1,9 @@
38a2c0
 #!/bin/bash
38a2c0
 
38a2c0
 AUTH_FILES[0]="/etc/pam.d/system-auth"
38a2c0
+{{%- if product == "rhel7" %}}
38a2c0
 AUTH_FILES[1]="/etc/pam.d/password-auth"
38a2c0
+{{%- endif %}}
38a2c0
 
38a2c0
 for pamFile in "${AUTH_FILES[@]}"
38a2c0
 do
38a2c0
diff --git a/products/rhel8/profiles/pci-dss.profile b/products/rhel8/profiles/pci-dss.profile
38a2c0
index 3ada8e6fe49..4df21f4ae6e 100644
38a2c0
--- a/products/rhel8/profiles/pci-dss.profile
38a2c0
+++ b/products/rhel8/profiles/pci-dss.profile
38a2c0
@@ -126,6 +126,7 @@ selections:
38a2c0
     - service_pcscd_enabled
38a2c0
     - sssd_enable_smartcards
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - file_owner_etc_shadow
38a2c0
diff --git a/products/rhel8/profiles/rht-ccp.profile b/products/rhel8/profiles/rht-ccp.profile
38a2c0
index 15abd98a6a5..7188062df72 100644
38a2c0
--- a/products/rhel8/profiles/rht-ccp.profile
38a2c0
+++ b/products/rhel8/profiles/rht-ccp.profile
38a2c0
@@ -54,6 +54,7 @@ selections:
38a2c0
     - accounts_password_pam_difok
38a2c0
     - accounts_passwords_pam_faillock_deny
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - require_singleuser_auth
38a2c0
diff --git a/products/rhel8/profiles/stig.profile b/products/rhel8/profiles/stig.profile
38a2c0
index 04f158116ee..8d69bb48d38 100644
38a2c0
--- a/products/rhel8/profiles/stig.profile
38a2c0
+++ b/products/rhel8/profiles/stig.profile
38a2c0
@@ -149,6 +149,9 @@ selections:
38a2c0
     # RHEL-08-010152
38a2c0
     - require_emergency_target_auth
38a2c0
 
38a2c0
+    # RHEL-08-010159
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
+
38a2c0
     # RHEL-08-010160
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
 
38a2c0
diff --git a/products/rhel9/profiles/pci-dss.profile b/products/rhel9/profiles/pci-dss.profile
38a2c0
index beb1acda31d..1e4044f4e7e 100644
38a2c0
--- a/products/rhel9/profiles/pci-dss.profile
38a2c0
+++ b/products/rhel9/profiles/pci-dss.profile
38a2c0
@@ -123,6 +123,7 @@ selections:
38a2c0
     - service_pcscd_enabled
38a2c0
     - sssd_enable_smartcards
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - file_owner_etc_shadow
38a2c0
diff --git a/products/rhel9/profiles/stig.profile b/products/rhel9/profiles/stig.profile
38a2c0
index 8f79b22e3e4..b9f557de030 100644
38a2c0
--- a/products/rhel9/profiles/stig.profile
38a2c0
+++ b/products/rhel9/profiles/stig.profile
38a2c0
@@ -150,6 +150,9 @@ selections:
38a2c0
     # RHEL-08-010152
38a2c0
     - require_emergency_target_auth
38a2c0
 
38a2c0
+    # RHEL-08-010159
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
+
38a2c0
     # RHEL-08-010160
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
 
38a2c0
diff --git a/products/rhv4/profiles/pci-dss.profile b/products/rhv4/profiles/pci-dss.profile
38a2c0
index c4ed0ec2d48..d00f44996d8 100644
38a2c0
--- a/products/rhv4/profiles/pci-dss.profile
38a2c0
+++ b/products/rhv4/profiles/pci-dss.profile
38a2c0
@@ -121,6 +121,7 @@ selections:
38a2c0
     - service_pcscd_enabled
38a2c0
     - sssd_enable_smartcards
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - file_owner_etc_shadow
38a2c0
diff --git a/products/rhv4/profiles/rhvh-stig.profile b/products/rhv4/profiles/rhvh-stig.profile
38a2c0
index 01c2fd8cc2d..9cf416665ab 100644
38a2c0
--- a/products/rhv4/profiles/rhvh-stig.profile
38a2c0
+++ b/products/rhv4/profiles/rhvh-stig.profile
38a2c0
@@ -356,6 +356,7 @@ selections:
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - package_opensc_installed
38a2c0
     - var_smartcard_drivers=cac
38a2c0
     - configure_opensc_card_drivers
38a2c0
diff --git a/products/rhv4/profiles/rhvh-vpp.profile b/products/rhv4/profiles/rhvh-vpp.profile
38a2c0
index c2b6c106937..e66fe435508 100644
38a2c0
--- a/products/rhv4/profiles/rhvh-vpp.profile
38a2c0
+++ b/products/rhv4/profiles/rhvh-vpp.profile
38a2c0
@@ -201,6 +201,7 @@ selections:
38a2c0
     - accounts_password_pam_unix_remember
38a2c0
     - set_password_hashing_algorithm_logindefs
38a2c0
     - set_password_hashing_algorithm_systemauth
38a2c0
+    - set_password_hashing_algorithm_passwordauth
38a2c0
     - set_password_hashing_algorithm_libuserconf
38a2c0
     - no_empty_passwords
38a2c0
 
38a2c0
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
38a2c0
index 3f6ec5e17c4..4aa925037b1 100644
38a2c0
--- a/shared/references/cce-redhat-avail.txt
38a2c0
+++ b/shared/references/cce-redhat-avail.txt
38a2c0
@@ -53,9 +53,6 @@ CCE-85939-7
38a2c0
 CCE-85940-5
38a2c0
 CCE-85941-3
38a2c0
 CCE-85942-1
38a2c0
-CCE-85943-9
38a2c0
-CCE-85945-4
38a2c0
-CCE-85946-2
38a2c0
 CCE-85947-0
38a2c0
 CCE-85948-8
38a2c0
 CCE-85949-6
38a2c0
diff --git a/tests/data/profile_stability/rhel8/pci-dss.profile b/tests/data/profile_stability/rhel8/pci-dss.profile
38a2c0
index f58bcf91cf2..e235d492438 100644
38a2c0
--- a/tests/data/profile_stability/rhel8/pci-dss.profile
38a2c0
+++ b/tests/data/profile_stability/rhel8/pci-dss.profile
38a2c0
@@ -1,5 +1,9 @@
38a2c0
+title: PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
38a2c0
 description: Ensures PCI-DSS v3.2.1 security configuration settings are applied.
38a2c0
-documentation_complete: true
38a2c0
+extends: null
38a2c0
+metadata:
38a2c0
+    SMEs:
38a2c0
+    - yuumasato
38a2c0
 reference: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
38a2c0
 selections:
38a2c0
 - account_disable_post_pw_expiration
38a2c0
@@ -120,6 +124,7 @@ selections:
38a2c0
 - service_pcscd_enabled
38a2c0
 - set_password_hashing_algorithm_libuserconf
38a2c0
 - set_password_hashing_algorithm_logindefs
38a2c0
+- set_password_hashing_algorithm_passwordauth
38a2c0
 - set_password_hashing_algorithm_systemauth
38a2c0
 - sshd_set_idle_timeout
38a2c0
 - sshd_set_keepalive_0
38a2c0
@@ -136,4 +141,8 @@ selections:
38a2c0
 - var_multiple_time_servers=rhel
38a2c0
 - var_sshd_set_keepalive=0
38a2c0
 - var_smartcard_drivers=cac
38a2c0
-title: PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
38a2c0
+platforms: !!set {}
38a2c0
+cpe_names: !!set {}
38a2c0
+platform: null
38a2c0
+filter_rules: ''
38a2c0
+documentation_complete: true
38a2c0
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
38a2c0
index ed739e724f4..c5fcbf47de2 100644
38a2c0
--- a/tests/data/profile_stability/rhel8/stig.profile
38a2c0
+++ b/tests/data/profile_stability/rhel8/stig.profile
38a2c0
@@ -336,6 +337,7 @@ selections:
38a2c0
 - service_systemd-coredump_disabled
38a2c0
 - service_usbguard_enabled
38a2c0
 - set_password_hashing_algorithm_logindefs
38a2c0
+- set_password_hashing_algorithm_passwordauth
38a2c0
 - set_password_hashing_algorithm_systemauth
38a2c0
 - sshd_disable_compression
38a2c0
 - sshd_disable_empty_passwords
38a2c0
diff --git a/tests/data/profile_stability/rhel8/stig_gui.profile b/tests/data/profile_stability/rhel8/stig_gui.profile
38a2c0
index 56c3fcb9f59..49ec4ae41ac 100644
38a2c0
--- a/tests/data/profile_stability/rhel8/stig_gui.profile
38a2c0
+++ b/tests/data/profile_stability/rhel8/stig_gui.profile
38a2c0
@@ -347,6 +348,7 @@ selections:
38a2c0
 - service_systemd-coredump_disabled
38a2c0
 - service_usbguard_enabled
38a2c0
 - set_password_hashing_algorithm_logindefs
38a2c0
+- set_password_hashing_algorithm_passwordauth
38a2c0
 - set_password_hashing_algorithm_systemauth
38a2c0
 - sshd_disable_compression
38a2c0
 - sshd_disable_empty_passwords