Blame SOURCES/scap-security-guide-0.1.64-audit_rules_for_ppc64le-PR_9124.patch

49eb97
From 1f53aae9b711466ce3d8f5d72d544c16024b6f7f Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 13:21:36 +0200
49eb97
Subject: [PATCH 01/18] add ppc64le applicability platform
49eb97
49eb97
---
49eb97
 shared/applicability/arch.yml                 |  6 ++++
49eb97
 ...proc_sys_kernel_osrelease_arch_ppc64le.xml | 33 +++++++++++++++++++
49eb97
 2 files changed, 39 insertions(+)
49eb97
 create mode 100644 shared/checks/oval/proc_sys_kernel_osrelease_arch_ppc64le.xml
49eb97
49eb97
diff --git a/shared/applicability/arch.yml b/shared/applicability/arch.yml
49eb97
index cb64a037192..1223001846a 100644
49eb97
--- a/shared/applicability/arch.yml
49eb97
+++ b/shared/applicability/arch.yml
49eb97
@@ -28,3 +28,9 @@ cpes:
49eb97
       bash_conditional: 'grep -q aarch64 /proc/sys/kernel/osrelease'
49eb97
       ansible_conditional: 'ansible_architecture == "aarch64"'
49eb97
 
49eb97
+  - ppc64le_arch:
49eb97
+      name: "cpe:/a:ppc64le_arch"
49eb97
+      title: "System architecture is ppc64le"
49eb97
+      check_id: proc_sys_kernel_osrelease_arch_ppc64le
49eb97
+      bash_conditional: 'grep -q ppc64le /proc/sys/kernel/osrelease'
49eb97
+      ansible_conditional: 'ansible_architecture == "ppc64le"'
49eb97
diff --git a/shared/checks/oval/proc_sys_kernel_osrelease_arch_ppc64le.xml b/shared/checks/oval/proc_sys_kernel_osrelease_arch_ppc64le.xml
49eb97
new file mode 100644
49eb97
index 00000000000..058de0db5e7
49eb97
--- /dev/null
49eb97
+++ b/shared/checks/oval/proc_sys_kernel_osrelease_arch_ppc64le.xml
49eb97
@@ -0,0 +1,33 @@
49eb97
+<def-group>
49eb97
+  
49eb97
+  version="1">
49eb97
+    <metadata>
49eb97
+      <title>Test that the architecture is ppc64le</title>
49eb97
+      <affected family="unix">
49eb97
+        <platform>multi_platform_all</platform>
49eb97
+      </affected>
49eb97
+      <description>Check that architecture of kernel in /proc/sys/kernel/osrelease is ppc64le</description>
49eb97
+    </metadata>
49eb97
+    <criteria>
49eb97
+      
49eb97
+      test_ref="test_proc_sys_kernel_osrelease_arch_ppc64le" />
49eb97
+    </criteria>
49eb97
+  </definition>
49eb97
+  
49eb97
+      comment="proc_sys_kernel is for ppc64le architecture"
49eb97
+      id="test_proc_sys_kernel_osrelease_arch_ppc64le"
49eb97
+  version="1">
49eb97
+    <ind:object object_ref="object_proc_sys_kernel_osrelease_arch_ppc64le" />
49eb97
+    <ind:state state_ref="state_proc_sys_kernel_osrelease_arch_ppc64le" />
49eb97
+  </ind:textfilecontent54_test>
49eb97
+
49eb97
+  <ind:textfilecontent54_object id="object_proc_sys_kernel_osrelease_arch_ppc64le" version="1">
49eb97
+    <ind:filepath>/proc/sys/kernel/osrelease</ind:filepath>
49eb97
+    <ind:pattern operation="pattern match">^.*\.(.*)$</ind:pattern>
49eb97
+    <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
49eb97
+  </ind:textfilecontent54_object>
49eb97
+
49eb97
+  <ind:textfilecontent54_state id="state_proc_sys_kernel_osrelease_arch_ppc64le" version="1">
49eb97
+    <ind:subexpression datatype="string" operation="pattern match">^ppc64le$</ind:subexpression>
49eb97
+  </ind:textfilecontent54_state>
49eb97
+</def-group>
49eb97
49eb97
From ced2b8699637af0f75786bd07f2944a6febaa531 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 13:46:47 +0200
49eb97
Subject: [PATCH 02/18] add audit_access_failed_ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_access_failed/rule.yml |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 ++++++
49eb97
 .../audit_access_failed_ppc64le/rule.yml      | 54 +++++++++++++++++++
49eb97
 3 files changed, 70 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
49eb97
index 87fc33ad041..74f92b94762 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed/rule.yml
49eb97
@@ -28,7 +28,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..412c67f15a1
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Unsuccessful%20file%20access%20%28any%20other%20opens%29%20This%20has%20to%20go%20last.%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%2Copenat%2Copenat2%2Copen_by_handle_at%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-access%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%2Copenat%2Copenat2%2Copen_by_handle_at%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-access%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-3-access-failed.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..f764da506e9
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,54 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful file accesses (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_access_failed =
49eb97
+"## Unsuccessful file access (any other opens) This has to go last.
49eb97
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-access
49eb97
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-access" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to access a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_access_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful attempts to access a file might be signs of malicious activity happening within the system. Auditing of such activities helps in their monitoring and investigation.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85953-8
49eb97
+    cce@rhel9: CCE-85955-3
49eb97
+
49eb97
+references:
49eb97
+    ism: 0582,0584,05885,0586,0846,0957
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-3-access-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_access_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-3-access-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_access_failed|indent(12) }}}
49eb97
49eb97
From 6c9b276ce50932934afa4e1af38ee5cd88166580 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 13:56:29 +0200
49eb97
Subject: [PATCH 03/18] add audit_access_success ppc64le
49eb97
49eb97
---
49eb97
 .../audit_access_success/rule.yml             |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 ++++++
49eb97
 .../audit_access_success_ppc64le/rule.yml     | 54 +++++++++++++++++++
49eb97
 3 files changed, 70 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
49eb97
index 284ed1756ff..7646d5f9f4b 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success/rule.yml
49eb97
@@ -27,7 +27,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..372b7c27c76
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Successful%20file%20access%20%28any%20other%20opens%29%20This%20has%20to%20go%20last.%0A%23%23%20These%20next%20two%20are%20likely%20to%20result%20in%20a%20whole%20lot%20of%20events%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%2Copenat%2Copenat2%2Copen_by_handle_at%20-F%20success%3D1%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsuccessful-access%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-3-access-success.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..b76fe0b4a4e
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,54 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful file accesses (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_access_success =
49eb97
+"## Successful file access (any other opens) This has to go last.
49eb97
+## These next two are likely to result in a whole lot of events
49eb97
+-a always,exit -F arch=b64 -S open,openat,openat2,open_by_handle_at -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-access" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to access a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_access_success|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of successful attempts to access a file helps in investigation of activities performed on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85960-3
49eb97
+    cce@rhel9: CCE-85961-1
49eb97
+
49eb97
+references:
49eb97
+    ism: 0582,0584,05885,0586,0846,0957
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-3-access-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_access_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-3-access-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_access_success|indent(12) }}}
49eb97
49eb97
From 7a343648d9e206a1b981f4235daeb9dd3cd475dc Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:01:03 +0200
49eb97
Subject: [PATCH 04/18] add audit_create_failed ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_create_failed/rule.yml |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 +++++
49eb97
 .../audit_create_failed_ppc64le/rule.yml      | 57 +++++++++++++++++++
49eb97
 3 files changed, 73 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_failed/rule.yml
49eb97
index f4da514e080..ac5e1f97413 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_failed/rule.yml
49eb97
@@ -36,7 +36,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..08c8dc85507
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Unsuccessful%20file%20creation%20%28open%20with%20O_CREAT%29%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%260100%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%260100%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20creat%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%260100%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%260100%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20creat%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-create%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-1-create-failed.rules 
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..ead598f8b9a
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,57 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful file creations (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_create_failed =
49eb97
+"## Unsuccessful file creation (open with O_CREAT)
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&0100 -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-create
49eb97
+-a always,exit -F arch=b64 -S open -F a1&0100 -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-create
49eb97
+-a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-create
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&0100 -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-create
49eb97
+-a always,exit -F arch=b64 -S open -F a1&0100 -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-create
49eb97
+-a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-create" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to create a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_create_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful file creations might be a sign of a malicious action being performed on the system. Keeping log of such events helps in monitoring and investigation of such actions.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85962-9
49eb97
+    cce@rhel9: CCE-85965-2
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-1-create-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_create_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-1-create-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_create_failed|indent(12) }}}
49eb97
49eb97
From c433196a29cfcf5b3dca2f3cde7dc230f43a181e Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:03:38 +0200
49eb97
Subject: [PATCH 05/18] add audit_create_success ppc64le
49eb97
49eb97
---
49eb97
 .../audit_create_success/rule.yml             |  2 +-
49eb97
 .../audit_create_success_ppc64le/rule.yml     | 54 +++++++++++++++++++
49eb97
 2 files changed, 55 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_success/rule.yml
49eb97
index 43e8674178b..21e71077030 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_success/rule.yml
49eb97
@@ -30,7 +30,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
new file mode 100644
49eb97
index 00000000000..294947c14ba
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,54 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful file creations (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_create_success =
49eb97
+"## Successful file creation (open with O_CREAT)
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&0100 -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-create
49eb97
+-a always,exit -F arch=b64 -S open -F a1&0100 -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-create
49eb97
+-a always,exit -F arch=b64 -S creat -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-create" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to create a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_create_success |indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of successful attempts to create a file helps in investigation of actions which happened on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85966-0
49eb97
+    cce@rhel9: CCE-85968-6
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-1-create-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_create_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-1-create-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_create_success|indent(12) }}}
49eb97
49eb97
From d8593e7d56ed85f34f228b24526b703eed141071 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:07:50 +0200
49eb97
Subject: [PATCH 06/18] add audit_delete_failed ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_delete_failed/rule.yml |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 +++++
49eb97
 .../audit_delete_failed_ppc64le/rule.yml      | 65 +++++++++++++++++++
49eb97
 3 files changed, 81 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed/rule.yml
49eb97
index 07ed41a9c4f..5ac68376970 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed/rule.yml
49eb97
@@ -28,7 +28,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..2fb2c25aa30
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Unsuccessful%20file%20delete%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20unlink%2Cunlinkat%2Crename%2Crenameat%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-delete%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20unlink%2Cunlinkat%2Crename%2Crenameat%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-delete
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..c8c532cb3bb
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,65 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful file deletions (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_delete_failed =
49eb97
+"## Unsuccessful file delete
49eb97
+-a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-delete
49eb97
+-a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-delete" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to delete a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_delete_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful attempts to delete a file might be signs of malicious activities. Auditing of such events help in monitoring and investigating of such activities.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85969-4
49eb97
+    cce@rhel9: CCE-85970-2
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205,SRG-OS-000468-GPOS-00212
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_delete_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_delete_failed|indent(12) }}}
49eb97
+
49eb97
+fixtext: |-
49eb97
+    Configure {{{ full_name }}} to audit all unsuccessful attempts to delete a file.
49eb97
+
49eb97
+    Create file "/etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules" with the exactly following content:
49eb97
+
49eb97
+    {{{ file_contents_audit_delete_failed|indent(4) }}}
49eb97
+
49eb97
+    Then, run the following commands:
49eb97
+
49eb97
+    $ sudo chmod o-rwx /etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules
49eb97
+    $ sudo augenrules --load
49eb97
49eb97
From 364e30b710df1f58a004edce60cfc6043d0aed3b Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:12:20 +0200
49eb97
Subject: [PATCH 07/18] add audit_delete_success ppc64le
49eb97
49eb97
---
49eb97
 .../audit_delete_success/rule.yml             |  2 +-
49eb97
 .../kubernetes/shared.yml                     |  7 ++
49eb97
 .../audit_delete_success_ppc64le/rule.yml     | 64 +++++++++++++++++++
49eb97
 3 files changed, 72 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_success/rule.yml
49eb97
index 93b42e3f4d6..b2fc0cca348 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_success/rule.yml
49eb97
@@ -26,7 +26,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..3734328c9e1
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,7 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+
49eb97
+{{% set file_contents = """## Successful file delete
49eb97
+-a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-delete""" -%}}
49eb97
+
49eb97
+{{{- kubernetes_machine_config_file(path='/etc/audit/rules.d/30-ospp-v42-4-delete-success.rules', file_permissions_mode='0600', source=file_contents) }}}
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..35362051948
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,64 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful file deletions (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_delete_success =
49eb97
+"## Successful file delete
49eb97
+-a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-delete" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to delete a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_delete_success|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of successful attempts to delete a file may help in monitoring and investigation of activities performed on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85974-4
49eb97
+    cce@rhel9: CCE-85976-9
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205,SRG-OS-000468-GPOS-00212
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-4-delete-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_delete_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-4-delete-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_delete_success|indent(12) }}}
49eb97
+
49eb97
+fixtext: |-
49eb97
+    Configure {{{ full_name }}} to audit all successful attempts to delete a file.
49eb97
+
49eb97
+    Create file "/etc/audit/rules.d/30-ospp-v42-4-delete-success.rules" with the exactly following content:
49eb97
+
49eb97
+    {{{ file_contents_audit_delete_success|indent(4) }}}
49eb97
+
49eb97
+    Then, run the following commands:
49eb97
+
49eb97
+    $ sudo chmod o-rwx /etc/audit/rules.d/30-ospp-v42-4-delete-failed.rules
49eb97
+    $ sudo augenrules --load
49eb97
49eb97
From 3bb8799b634e8ec164a6ff7287df92e9519c1a47 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:16:37 +0200
49eb97
Subject: [PATCH 08/18] add audit_modify_failed ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_modify_failed/rule.yml |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 +++++
49eb97
 .../audit_modify_failed_ppc64le/rule.yml      | 57 +++++++++++++++++++
49eb97
 3 files changed, 73 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed/rule.yml
49eb97
index e4d042a50cb..16c7ca38e5a 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed/rule.yml
49eb97
@@ -36,7 +36,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..f07ff3607ae
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Unsuccessful%20file%20modifications%20%28open%20for%20write%20or%20truncate%29%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%2601003%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%2601003%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20truncate%2Cftruncate%20-F%20exit%3D-EACCES%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%2601003%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%2601003%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20truncate%2Cftruncate%20-F%20exit%3D-EPERM%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dunsuccessful-modification%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-2-modify-failed.rules 
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..d5d11a0f214
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,57 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful file modifications (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_modify_failed =
49eb97
+"## Unsuccessful file modifications (open for write or truncate)
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&01003 -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification
49eb97
+-a always,exit -F arch=b64 -S open -F a1&01003 -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification
49eb97
+-a always,exit -F arch=b64 -S truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&01003 -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification
49eb97
+-a always,exit -F arch=b64 -S open -F a1&01003 -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification
49eb97
+-a always,exit -F arch=b64 -S truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-modification" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to modify a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_modify_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful file modifications might be a sign of a malicious action being performed on the system. Auditing of such events helps in detection and investigation of such actions.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85977-7
49eb97
+    cce@rhel9: CCE-85978-5
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-2-modify-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_modify_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-2-modify-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_modify_failed|indent(12) }}}
49eb97
49eb97
From 86196a6512dab40e8bed5a06ea0581f2290d5ad8 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:20:01 +0200
49eb97
Subject: [PATCH 09/18] add audit modify_success ppc64le
49eb97
49eb97
---
49eb97
 .../audit_modify_success/rule.yml             |  2 +-
49eb97
 .../kubernetes/shared.yml                     | 15 +++++
49eb97
 .../audit_modify_success_ppc64le/rule.yml     | 55 +++++++++++++++++++
49eb97
 3 files changed, 71 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_success/rule.yml
49eb97
index 4c65055f577..cafc88f49b7 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_success/rule.yml
49eb97
@@ -31,7 +31,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..92310b9772e
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20Successful%20file%20modifications%20%28open%20for%20write%20or%20truncate%29%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%2601003%20-F%20success%3D1%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%2601003%20-F%20success%3D1%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsuccessful-modification%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20truncate%2Cftruncate%20-F%20success%3D1%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsuccessful-modification%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42-2-modify-success.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..e45015e5949
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,55 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful file modifications (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_modify_success =
49eb97
+"## Successful file modifications (open for write or truncate)
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&01003 -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-modification
49eb97
+-a always,exit -F arch=b64 -S open -F a1&01003 -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-modification
49eb97
+-a always,exit -F arch=b64 -S truncate,ftruncate -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-modification" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to modify a file are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_modify_success|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of successful attempts to modify a file helps in investigation of actions which happened on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85979-3
49eb97
+    cce@rhel9: CCE-85980-1
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000458-GPOS-00203,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000461-GPOS-00205
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-2-modify-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_modify_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-2-modify-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_modify_success|indent(12) }}}
49eb97
49eb97
From 4b3fc315e2e946f103826ac010a056390c906aca Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:23:45 +0200
49eb97
Subject: [PATCH 10/18] add audit_module_load ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_module_load/rule.yml   |  3 ++
49eb97
 .../kubernetes/shared.yml                     | 15 ++++++
49eb97
 .../audit_module_load_ppc64le/rule.yml        | 52 +++++++++++++++++++
49eb97
 3 files changed, 70 insertions(+)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_module_load/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_module_load/rule.yml
49eb97
index 5e840fca5a3..b04d879a9c0 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_module_load/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_module_load/rule.yml
49eb97
@@ -26,6 +26,9 @@ rationale: |-
49eb97
 
49eb97
 severity: medium
49eb97
 
49eb97
+platforms:
49eb97
+    - not ppc64le_arch
49eb97
+
49eb97
 identifiers:
49eb97
     cce@rhel8: CCE-82838-4
49eb97
     cce@rhel9: CCE-90814-5
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..231034a9c54
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20These%20rules%20watch%20for%20kernel%20module%20insertion.%20By%20monitoring%0A%23%23%20the%20syscall%2C%20we%20do%20not%20need%20any%20watches%20on%20programs.%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20init_module%2Cfinit_module%20-F%20key%3Dmodule-load%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20delete_module%20-F%20key%3Dmodule-unload%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/43-module-load.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..3f59eecec86
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
@@ -0,0 +1,52 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of loading and unloading of kernel modules (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_module_load =
49eb97
+"## These rules watch for kernel module insertion. By monitoring
49eb97
+## the syscall, we do not need any watches on programs.
49eb97
+-a always,exit -F arch=b64 -S init_module,finit_module -F key=module-load
49eb97
+-a always,exit -F arch=b64 -S delete_module -F key=module-unload" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that loading and unloading of kernel modules is audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_module_load|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+rationale: |-
49eb97
+    Loading of a malicious kernel module introduces a risk to the system, as the module has access to sensitive data and perform actions at the operating system kernel level. Having such events audited helps in monitoring and investigating of malicious activities.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85981-9
49eb97
+    cce@rhel9: CCE-85982-7
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000471-GPOS-00216,SRG-OS-000477-GPOS-00222,SRG-OS-000475-GPOS-00220
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/43-module-load.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_module_load|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/43-module-load.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_module_load|indent(12) }}}
49eb97
49eb97
From 3265584f7f4396ee037f675a4994a1e85e26564b Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 8 Jul 2022 14:34:25 +0200
49eb97
Subject: [PATCH 11/18] add audit_ospp_general ppc64le
49eb97
49eb97
---
49eb97
 .../policy_rules/audit_ospp_general/rule.yml  |   2 +-
49eb97
 .../kubernetes/shared.yml                     |  15 ++
49eb97
 .../audit_ospp_general_ppc64le/rule.yml       | 132 ++++++++++++++++++
49eb97
 3 files changed, 148 insertions(+), 1 deletion(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/kubernetes/shared.yml
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
49eb97
index e82c5aee936..93417f4cf6d 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general/rule.yml
49eb97
@@ -109,7 +109,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/kubernetes/shared.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/kubernetes/shared.yml
49eb97
new file mode 100644
49eb97
index 00000000000..fa81ece03c6
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/kubernetes/shared.yml
49eb97
@@ -0,0 +1,15 @@
49eb97
+---
49eb97
+# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_rhcos
49eb97
+apiVersion: machineconfiguration.openshift.io/v1
49eb97
+kind: MachineConfig
49eb97
+spec:
49eb97
+  config:
49eb97
+    ignition:
49eb97
+      version: 3.1.0
49eb97
+    storage:
49eb97
+      files:
49eb97
+      - contents:
49eb97
+          source: data:,%23%23%20The%20purpose%20of%20these%20rules%20is%20to%20meet%20the%20requirements%20for%20Operating%0A%23%23%20System%20Protection%20Profile%20%28OSPP%29v4.2.%20These%20rules%20depends%20on%20having%0A%23%23%20the%20following%20rule%20files%20copied%20to%20%2Fetc%2Faudit%2Frules.d%3A%0A%23%23%0A%23%23%2010-base-config.rules%2C%2011-loginuid.rules%2C%0A%23%23%2030-ospp-v42-1-create-failed.rules%2C%2030-ospp-v42-1-create-success.rules%2C%0A%23%23%2030-ospp-v42-2-modify-failed.rules%2C%2030-ospp-v42-2-modify-success.rules%2C%0A%23%23%2030-ospp-v42-3-access-failed.rules%2C%2030-ospp-v42-3-access-success.rules%2C%0A%23%23%2030-ospp-v42-4-delete-failed.rules%2C%2030-ospp-v42-4-delete-success.rules%2C%0A%23%23%2030-ospp-v42-5-perm-change-failed.rules%2C%0A%23%23%2030-ospp-v42-5-perm-change-success.rules%2C%0A%23%23%2030-ospp-v42-6-owner-change-failed.rules%2C%0A%23%23%2030-ospp-v42-6-owner-change-success.rules%0A%23%23%0A%23%23%20original%20copies%20may%20be%20found%20in%20%2Fusr%2Fshare%2Faudit%2Fsample-rules%2F%0A%0A%0A%23%23%20User%20add%20delete%20modify.%20This%20is%20covered%20by%20pam.%20However%2C%20someone%20could%0A%23%23%20open%20a%20file%20and%20directly%20create%20or%20modify%20a%20user%2C%20so%20we%27ll%20watch%20passwd%20and%0A%23%23%20shadow%20for%20writes%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%2603%20-F%20path%3D%2Fetc%2Fpasswd%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%2603%20-F%20path%3D%2Fetc%2Fpasswd%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20openat%2Copen_by_handle_at%20-F%20a2%2603%20-F%20path%3D%2Fetc%2Fshadow%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A-a%20always%2Cexit%20-F%20arch%3Db64%20-S%20open%20-F%20a1%2603%20-F%20path%3D%2Fetc%2Fshadow%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A%0A%23%23%20User%20enable%20and%20disable.%20This%20is%20entirely%20handled%20by%20pam.%0A%0A%23%23%20Group%20add%20delete%20modify.%20This%20is%20covered%20by%20pam.%20However%2C%20someone%20could%0A%23%23%20open%20a%20file%20and%20directly%20create%20or%20modify%20a%20user%2C%20so%20we%27ll%20watch%20group%20and%0A%23%23%20gshadow%20for%20writes%0A-a%20always%2Cexit%20-F%20path%3D%2Fetc%2Fpasswd%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A-a%20always%2Cexit%20-F%20path%3D%2Fetc%2Fshadow%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Duser-modify%0A-a%20always%2Cexit%20-F%20path%3D%2Fetc%2Fgroup%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dgroup-modify%0A-a%20always%2Cexit%20-F%20path%3D%2Fetc%2Fgshadow%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dgroup-modify%0A%0A%0A%23%23%20Use%20of%20special%20rights%20for%20config%20changes.%20This%20would%20be%20use%20of%20setuid%0A%23%23%20programs%20that%20relate%20to%20user%20accts.%20This%20is%20not%20all%20setuid%20apps%20because%0A%23%23%20requirements%20are%20only%20for%20ones%20that%20affect%20system%20configuration.%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fsbin%2Funix_chkpwd%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fsbin%2Fusernetctl%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fsbin%2Fuserhelper%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fsbin%2Fseunshare%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fmount%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fnewgrp%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fnewuidmap%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fgpasswd%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fnewgidmap%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fumount%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fpasswd%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fcrontab%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20path%3D%2Fusr%2Fbin%2Fat%20-F%20perm%3Dx%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dspecial-config-changes%0A%0A%23%23%20Privilege%20escalation%20via%20su%20or%20sudo.%20This%20is%20entirely%20handled%20by%20pam.%0A%0A%23%23%20Watch%20for%20configuration%20changes%20to%20privilege%20escalation.%0A-a%20always%2Cexit%20-F%20path%3D%2Fetc%2Fsudoers%20-F%20perm%3Dwa%20-F%20key%3Dspecial-config-changes%0A-a%20always%2Cexit%20-F%20dir%3D%2Fetc%2Fsudoers.d%2F%20-F%20perm%3Dwa%20-F%20key%3Dspecial-config-changes%0A%0A%23%23%20Audit%20log%20access%0A-a%20always%2Cexit%20-F%20dir%3D%2Fvar%2Flog%2Faudit%2F%20-F%20perm%3Dr%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Daccess-audit-trail%0A%23%23%20Attempts%20to%20Alter%20Process%20and%20Session%20Initiation%20Information%0A-a%20always%2Cexit%20-F%20path%3D%2Fvar%2Frun%2Futmp%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsession%0A-a%20always%2Cexit%20-F%20path%3D%2Fvar%2Flog%2Fbtmp%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsession%0A-a%20always%2Cexit%20-F%20path%3D%2Fvar%2Flog%2Fwtmp%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3Dsession%0A%0A%23%23%20Attempts%20to%20modify%20MAC%20controls%0A-a%20always%2Cexit%20-F%20dir%3D%2Fetc%2Fselinux%2F%20-F%20perm%3Dwa%20-F%20auid%3E%3D1000%20-F%20auid%21%3Dunset%20-F%20key%3DMAC-policy%0A%0A%23%23%20Software%20updates.%20This%20is%20entirely%20handled%20by%20rpm.%0A%0A%23%23%20System%20start%20and%20shutdown.%20This%20is%20entirely%20handled%20by%20systemd%0A%0A%23%23%20Kernel%20Module%20loading.%20This%20is%20handled%20in%2043-module-load.rules%0A%0A%23%23%20Application%20invocation.%20The%20requirements%20list%20an%20optional%20requirement%0A%23%23%20FPT_SRP_EXT.1%20Software%20Restriction%20Policies.%20This%20event%20is%20intended%20to%0A%23%23%20state%20results%20from%20that%20policy.%20This%20would%20be%20handled%20entirely%20by%0A%23%23%20that%20daemon.%0A
49eb97
+        mode: 0600
49eb97
+        path: /etc/audit/rules.d/30-ospp-v42.rules
49eb97
+        overwrite: true
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..8d408578c3a
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
@@ -0,0 +1,132 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Perform general configuration of Audit for OSPP (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_ospp_general =
49eb97
+"## The purpose of these rules is to meet the requirements for Operating
49eb97
+## System Protection Profile (OSPP)v4.2. These rules depends on having
49eb97
+## the following rule files copied to /etc/audit/rules.d:
49eb97
+##
49eb97
+## 10-base-config.rules, 11-loginuid.rules,
49eb97
+## 30-ospp-v42-1-create-failed.rules, 30-ospp-v42-1-create-success.rules,
49eb97
+## 30-ospp-v42-2-modify-failed.rules, 30-ospp-v42-2-modify-success.rules,
49eb97
+## 30-ospp-v42-3-access-failed.rules, 30-ospp-v42-3-access-success.rules,
49eb97
+## 30-ospp-v42-4-delete-failed.rules, 30-ospp-v42-4-delete-success.rules,
49eb97
+## 30-ospp-v42-5-perm-change-failed.rules,
49eb97
+## 30-ospp-v42-5-perm-change-success.rules,
49eb97
+## 30-ospp-v42-6-owner-change-failed.rules,
49eb97
+## 30-ospp-v42-6-owner-change-success.rules
49eb97
+##
49eb97
+## original copies may be found in /usr/share/audit/sample-rules/
49eb97
+
49eb97
+
49eb97
+## User add delete modify. This is covered by pam. However, someone could
49eb97
+## open a file and directly create or modify a user, so we'll watch passwd and
49eb97
+## shadow for writes
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+-a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/passwd -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+-a always,exit -F arch=b64 -S openat,open_by_handle_at -F a2&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+-a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/shadow -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+
49eb97
+## User enable and disable. This is entirely handled by pam.
49eb97
+
49eb97
+## Group add delete modify. This is covered by pam. However, someone could
49eb97
+## open a file and directly create or modify a user, so we'll watch group and
49eb97
+## gshadow for writes
49eb97
+-a always,exit -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+-a always,exit -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=user-modify
49eb97
+-a always,exit -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
49eb97
+-a always,exit -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F key=group-modify
49eb97
+
49eb97
+
49eb97
+## Use of special rights for config changes. This would be use of setuid
49eb97
+## programs that relate to user accts. This is not all setuid apps because
49eb97
+## requirements are only for ones that affect system configuration.
49eb97
+-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/sbin/usernetctl -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/sbin/seunshare -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/newuidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/newgidmap -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+-a always,exit -F path=/usr/bin/at -F perm=x -F auid>=1000 -F auid!=unset -F key=special-config-changes
49eb97
+
49eb97
+## Privilege escalation via su or sudo. This is entirely handled by pam.
49eb97
+
49eb97
+## Watch for configuration changes to privilege escalation.
49eb97
+-a always,exit -F path=/etc/sudoers -F perm=wa -F key=special-config-changes
49eb97
+-a always,exit -F dir=/etc/sudoers.d/ -F perm=wa -F key=special-config-changes
49eb97
+
49eb97
+## Audit log access
49eb97
+-a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
49eb97
+## Attempts to Alter Process and Session Initiation Information
49eb97
+-a always,exit -F path=/var/run/utmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
49eb97
+-a always,exit -F path=/var/log/btmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
49eb97
+-a always,exit -F path=/var/log/wtmp -F perm=wa -F auid>=1000 -F auid!=unset -F key=session
49eb97
+
49eb97
+## Attempts to modify MAC controls
49eb97
+-a always,exit -F dir=/etc/selinux/ -F perm=wa -F auid>=1000 -F auid!=unset -F key=MAC-policy
49eb97
+
49eb97
+## Software updates. This is entirely handled by rpm.
49eb97
+
49eb97
+## System start and shutdown. This is entirely handled by systemd
49eb97
+
49eb97
+## Kernel Module loading. This is handled in 43-module-load.rules
49eb97
+
49eb97
+## Application invocation. The requirements list an optional requirement
49eb97
+## FPT_SRP_EXT.1 Software Restriction Policies. This event is intended to
49eb97
+## state results from that policy. This would be handled entirely by
49eb97
+## that daemon." %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Configure some basic <tt>Audit</tt> parameters specific for OSPP profile.
49eb97
+    In particular, configure <tt>Audit</tt> to watch for direct modification of files storing system user and group information, and usage of applications with special rights which can change system configuration.
49eb97
+    Further audited events include access to audit log it self, attempts to Alter Process and Session Initiation Information, and attempts to modify MAC controls.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_ospp_general|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of events listed in the description provides data for monitoring and investigation of potentially malicious events e.g. tampering with <tt>Audit</tt> logs, malicious access to files storing information about system users and groups etc.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85983-5
49eb97
+    cce@rhel9: CCE-85984-3
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000004-GPOS-00004,SRG-OS-000241-GPOS-00091,SRG-OS-000476-GPOS-00221,SRG-OS-000327-GPOS-00127,SRG-OS-000475-GPOS-00220,SRG-OS-000239-GPOS-00089,SRG-OS-000274-GPOS-00104,SRG-OS-000275-GPOS-00105,SRG-OS-000303-GPOS-00120,SRG-OS-000304-GPOS-00121
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_ospp_general|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42.rules
49eb97
+        contents: |+
49eb97
+            {{{ file_contents_audit_ospp_general|indent(12) }}}
49eb97
+#do not remove this comment, it stops Jinja from including more blank lines to the variable
49eb97
49eb97
From 33d024e126e207e9b1e79b8946bcd2cf4cfc864c Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 11 Jul 2022 11:08:54 +0200
49eb97
Subject: [PATCH 12/18] add audit_owner_change_failed ppc64le
49eb97
49eb97
---
49eb97
 .../audit_owner_change_failed/rule.yml        |  2 +-
49eb97
 .../rule.yml                                  | 53 +++++++++++++++++++
49eb97
 shared/references/cce-redhat-avail.txt        |  2 -
49eb97
 3 files changed, 54 insertions(+), 3 deletions(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed/rule.yml
49eb97
index 09c29fb1421..630c54693b5 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed/rule.yml
49eb97
@@ -28,7 +28,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..6324bb4fd3b
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,53 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful ownership changes (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_owner_change_failed =
49eb97
+"## Unsuccessful ownership change
49eb97
+-a always,exit -F arch=b64 -S lchown,fchown,chown,fchownat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-owner-change
49eb97
+-a always,exit -F arch=b64 -S lchown,fchown,chown,fchownat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-owner-change" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to change an ownership of files or directories are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_owner_change_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful attempts to change an ownership of files or directories might be signs of a malicious activity. Having such events audited helps in monitoring and investigation of such activities.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85985-0
49eb97
+    cce@rhel9: CCE-85988-4
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000462-GPOS-00206,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000466-GPOS-00210,SRG-OS-000064-GPOS-00033
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-6-owner-change-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_owner_change_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-6-owner-change-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_owner_change_failed|indent(12) }}}
49eb97
49eb97
From a7d6fd67d0916baa324d9d342073b93f386004ce Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 11 Jul 2022 11:11:38 +0200
49eb97
Subject: [PATCH 13/18] add audit_owner_change_success aarch64
49eb97
49eb97
---
49eb97
 .../audit_owner_change_success/rule.yml       |  2 +-
49eb97
 .../rule.yml                                  | 52 +++++++++++++++++++
49eb97
 shared/references/cce-redhat-avail.txt        |  2 -
49eb97
 3 files changed, 53 insertions(+), 3 deletions(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success/rule.yml
49eb97
index 934739fd043..744249d8740 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success/rule.yml
49eb97
@@ -26,7 +26,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..62639140885
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,52 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful ownership changes (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_owner_change_success =
49eb97
+"## Successful ownership change
49eb97
+-a always,exit -F arch=b64 -S lchown,fchown,chown,fchownat -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-owner-change" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to change an ownership of files or directories are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_owner_change_success|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing of successful ownership changes of files or directories helps in monitoring or investingating of activities performed on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85997-5
49eb97
+    cce@rhel9: CCE-85998-3
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000462-GPOS-00206,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000466-GPOS-00210,SRG-OS-000064-GPOS-00033
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-6-owner-change-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_owner_change_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-6-owner-change-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_owner_change_success|indent(12) }}}
49eb97
49eb97
From 0e86aaed2dbe0d215d73e02565ab7eaefe803c70 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 11 Jul 2022 11:13:57 +0200
49eb97
Subject: [PATCH 14/18] add audit_perm_change_failed for ppc64le
49eb97
49eb97
---
49eb97
 .../audit_perm_change_failed/rule.yml         |  2 +-
49eb97
 .../audit_perm_change_failed_ppc64le/rule.yml | 53 +++++++++++++++++++
49eb97
 shared/references/cce-redhat-avail.txt        |  2 -
49eb97
 3 files changed, 54 insertions(+), 3 deletions(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed/rule.yml
49eb97
index 3f7db62b615..0870d41738e 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed/rule.yml
49eb97
@@ -28,7 +28,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..e55de06efc0
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
@@ -0,0 +1,53 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of unsuccessful permission changes (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_perm_change_failed =
49eb97
+"## Unsuccessful permission change
49eb97
+-a always,exit -F arch=b64 -S chmod,fchmod,fchmodat,setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=unsuccessful-perm-change
49eb97
+-a always,exit -F arch=b64 -S chmod,fchmod,fchmodat,setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=unsuccessful-perm-change" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that unsuccessful attempts to change file or directory permissions are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_perm_change_failed|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Unsuccessful attempts to change permissions of files or directories might be signs of malicious activity. Having such events audited helps in monitoring and investigation of such activities.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-85999-1
49eb97
+    cce@rhel9: CCE-86000-7
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000462-GPOS-00206,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000466-GPOS-00210,SRG-OS-000064-GPOS-00033
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-5-perm-change-failed.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_perm_change_failed|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-5-perm-change-failed.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_perm_change_failed|indent(12) }}}
49eb97
49eb97
From c4df26914cc7dc0911f08950be391a31faae8d63 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 11 Jul 2022 11:16:05 +0200
49eb97
Subject: [PATCH 15/18] add audit_perm_change_success ppc64le
49eb97
49eb97
---
49eb97
 .../audit_perm_change_success/rule.yml        |  2 +-
49eb97
 .../rule.yml                                  | 52 +++++++++++++++++++
49eb97
 shared/references/cce-redhat-avail.txt        |  2 -
49eb97
 3 files changed, 53 insertions(+), 3 deletions(-)
49eb97
 create mode 100644 linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success/rule.yml
49eb97
index 4a67bfde428..e0ff8648348 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success/rule.yml
49eb97
@@ -26,7 +26,7 @@ rationale: |-
49eb97
 # so do not apply this rule but apply the specific one instead
49eb97
 {{% if product == "rhel9" %}}
49eb97
 platforms:
49eb97
-    - not aarch64_arch
49eb97
+    - not aarch64_arch and not ppc64le_arch
49eb97
 {{% endif %}}
49eb97
 
49eb97
 identifiers:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
new file mode 100644
49eb97
index 00000000000..0cbb0f60e0c
49eb97
--- /dev/null
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
@@ -0,0 +1,52 @@
49eb97
+documentation_complete: true
49eb97
+
49eb97
+prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+
49eb97
+title: 'Configure auditing of successful permission changes (ppc64le)'
49eb97
+
49eb97
+{{% set file_contents_audit_perm_change_success =
49eb97
+"## Successful permission change
49eb97
+-a always,exit -F arch=b64 -S chmod,fchmod,fchmodat,setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr -F success=1 -F auid>=1000 -F auid!=unset -F key=successful-perm-change" %}}
49eb97
+
49eb97
+description: |-
49eb97
+    Ensure that successful attempts to modify permissions of files or directories are audited.
49eb97
+
49eb97
+    The following rules configure audit as described above:
49eb97
+    
{{{ file_contents_audit_perm_change_success|indent }}}    
49eb97
+
49eb97
+    Load new Audit rules into kernel by running:
49eb97
+    
augenrules --load
49eb97
+
49eb97
+    Note: This rule uses a special set of Audit rules to comply with OSPP 4.2.1. You may reuse this rule in different profiles. If you decide to do so, it is recommended that you inspect contents of the file closely and make sure that they are alligned with your needs.
49eb97
+
49eb97
+rationale: |-
49eb97
+    Auditing successful file or directory permission changes helps in monitoring and investigating of activities performed on the system.
49eb97
+
49eb97
+severity: medium
49eb97
+
49eb97
+platforms:
49eb97
+    - ppc64le_arch
49eb97
+
49eb97
+identifiers:
49eb97
+    cce@rhel8: CCE-86001-5
49eb97
+    cce@rhel9: CCE-86002-3
49eb97
+
49eb97
+references:
49eb97
+    nist: AU-2(a)
49eb97
+    ospp: FAU_GEN.1.1.c
49eb97
+    srg: SRG-OS-000462-GPOS-00206,SRG-OS-000463-GPOS-00207,SRG-OS-000465-GPOS-00209,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220,SRG-OS-000466-GPOS-00210,SRG-OS-000064-GPOS-00033
49eb97
+
49eb97
+ocil_clause: 'the file does not exist or the content differs'
49eb97
+
49eb97
+ocil: |-
49eb97
+    To verify that the <tt>Audit</tt> is correctly configured according to recommended rules, check the content of the file with the following command:
49eb97
+    
cat /etc/audit/rules.d/30-ospp-v42-5-perm-change-success.rules
49eb97
+    The output has to be exactly as follows:
49eb97
+    
{{{ file_contents_audit_perm_change_success|indent }}}    
49eb97
+
49eb97
+template:
49eb97
+    name: audit_file_contents
49eb97
+    vars:
49eb97
+        filepath: /etc/audit/rules.d/30-ospp-v42-5-perm-change-success.rules
49eb97
+        contents: |-
49eb97
+            {{{ file_contents_audit_perm_change_success|indent(12) }}}
49eb97
49eb97
From af066dd83f416d40eabe8b9cec584f726b37f14e Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 11 Jul 2022 11:42:46 +0200
49eb97
Subject: [PATCH 16/18] add new rules to rhel9 ospp profile
49eb97
49eb97
---
49eb97
 products/rhel9/profiles/ospp.profile | 16 ++++++++++++++++
49eb97
 1 file changed, 16 insertions(+)
49eb97
49eb97
diff --git a/products/rhel9/profiles/ospp.profile b/products/rhel9/profiles/ospp.profile
49eb97
index 1c97558669f..41930e4b840 100644
49eb97
--- a/products/rhel9/profiles/ospp.profile
49eb97
+++ b/products/rhel9/profiles/ospp.profile
49eb97
@@ -279,35 +279,51 @@ selections:
49eb97
     - audit_immutable_login_uids
49eb97
     - audit_create_failed
49eb97
     - audit_create_failed_aarch64
49eb97
+    - audit_create_failed_ppc64le
49eb97
     - audit_create_success
49eb97
     - audit_create_success_aarch64
49eb97
+    - audit_create_success_ppc64le
49eb97
     - audit_modify_failed
49eb97
     - audit_modify_failed_aarch64
49eb97
+    - audit_modify_failed_ppc64le
49eb97
     - audit_modify_success
49eb97
     - audit_modify_success_aarch64
49eb97
+    - audit_modify_success_ppc64le
49eb97
     - audit_access_failed
49eb97
     - audit_access_failed_aarch64
49eb97
+    - audit_access_failed_ppc64le
49eb97
     - audit_access_success
49eb97
     - audit_access_success.severity=info
49eb97
     - audit_access_success.role=unscored
49eb97
     - audit_access_success_aarch64
49eb97
     - audit_access_success_aarch64.severity=info
49eb97
     - audit_access_success_aarch64.role=unscored
49eb97
+    - audit_access_success_ppc64le
49eb97
+    - audit_access_success_ppc64le.severity=info
49eb97
+    - audit_access_success_ppc64le.role=unscored
49eb97
     - audit_delete_failed
49eb97
     - audit_delete_failed_aarch64
49eb97
+    - audit_delete_failed_ppc64le
49eb97
     - audit_delete_success
49eb97
     - audit_delete_success_aarch64
49eb97
+    - audit_delete_success_ppc64le
49eb97
     - audit_perm_change_failed
49eb97
     - audit_perm_change_failed_aarch64
49eb97
+    - audit_perm_change_failed_ppc64le
49eb97
     - audit_perm_change_success
49eb97
     - audit_perm_change_success_aarch64
49eb97
+    - audit_perm_change_success_ppc64le
49eb97
     - audit_owner_change_failed
49eb97
     - audit_owner_change_failed_aarch64
49eb97
+    - audit_owner_change_failed_ppc64le
49eb97
     - audit_owner_change_success
49eb97
     - audit_owner_change_success_aarch64
49eb97
+    - audit_owner_change_success_ppc64le
49eb97
     - audit_ospp_general
49eb97
     - audit_ospp_general_aarch64
49eb97
+    - audit_ospp_general_ppc64le
49eb97
     - audit_module_load
49eb97
+    - audit_module_load_ppc64le
49eb97
 
49eb97
     ## Enable Automatic Software Updates
49eb97
     ## SI-2 / FMT_MOF_EXT.1 (FMT_SMF_EXT.1)
49eb97
49eb97
From 1fb5a22850fb1bfbaee76422ef57b3b631d4c91f Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Fri, 15 Jul 2022 10:40:07 +0200
49eb97
Subject: [PATCH 17/18] make newly added rules RHEL9 only
49eb97
49eb97
- change their prodtype to rhel9
49eb97
- return rhel8 cces back to the pool
49eb97
- make the platform in generic rule applicable only on rhel9 since on rhel8 the file content is the same regardless of the architecture
49eb97
- remove rules from rhel8 profiles
49eb97
---
49eb97
 .../policy_rules/audit_access_failed/rule.yml      |  4 ++++
49eb97
 .../audit_access_failed_ppc64le/rule.yml           |  3 +--
49eb97
 .../policy_rules/audit_access_success/rule.yml     |  4 ++++
49eb97
 .../audit_access_success_ppc64le/rule.yml          |  3 +--
49eb97
 .../policy_rules/audit_create_failed/rule.yml      |  4 ++++
49eb97
 .../audit_create_failed_ppc64le/rule.yml           |  3 +--
49eb97
 .../policy_rules/audit_create_success/rule.yml     |  4 ++++
49eb97
 .../audit_create_success_ppc64le/rule.yml          |  3 +--
49eb97
 .../policy_rules/audit_delete_failed/rule.yml      |  5 ++++-
49eb97
 .../audit_delete_failed_ppc64le/rule.yml           |  3 +--
49eb97
 .../policy_rules/audit_delete_success/rule.yml     |  4 ++++
49eb97
 .../audit_delete_success_ppc64le/rule.yml          |  3 +--
49eb97
 .../policy_rules/audit_modify_failed/rule.yml      |  4 ++++
49eb97
 .../audit_modify_failed_ppc64le/rule.yml           |  3 +--
49eb97
 .../policy_rules/audit_modify_success/rule.yml     |  4 ++++
49eb97
 .../audit_modify_success_ppc64le/rule.yml          |  3 +--
49eb97
 .../policy_rules/audit_module_load/rule.yml        |  4 ++++
49eb97
 .../audit_module_load_ppc64le/rule.yml             |  3 +--
49eb97
 .../policy_rules/audit_ospp_general/rule.yml       |  4 ++++
49eb97
 .../audit_ospp_general_ppc64le/rule.yml            |  3 +--
49eb97
 .../audit_owner_change_failed/rule.yml             |  4 ++++
49eb97
 .../audit_owner_change_failed_ppc64le/rule.yml     |  3 +--
49eb97
 .../audit_owner_change_success/rule.yml            |  4 ++++
49eb97
 .../audit_owner_change_success_ppc64le/rule.yml    |  3 +--
49eb97
 .../policy_rules/audit_perm_change_failed/rule.yml |  4 ++++
49eb97
 .../audit_perm_change_failed_ppc64le/rule.yml      |  3 +--
49eb97
 .../audit_perm_change_success/rule.yml             |  4 ++++
49eb97
 .../audit_perm_change_success_ppc64le/rule.yml     |  3 +--
49eb97
 shared/references/cce-redhat-avail.txt             | 14 ++++++++++++++
49eb97
 29 files changed, 84 insertions(+), 29 deletions(-)
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
index f764da506e9..6547b12e349 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful file accesses (ppc64le)'
49eb97
 
49eb97
@@ -29,7 +29,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85953-8
49eb97
     cce@rhel9: CCE-85955-3
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
index b76fe0b4a4e..6ec2fc3b32d 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful file accesses (ppc64le)'
49eb97
 
49eb97
@@ -29,7 +29,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85960-3
49eb97
     cce@rhel9: CCE-85961-1
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
index ead598f8b9a..7af3f3b5bbb 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful file creations (ppc64le)'
49eb97
 
49eb97
@@ -33,7 +33,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85962-9
49eb97
     cce@rhel9: CCE-85965-2
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
index 294947c14ba..87bfe3de933 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful file creations (ppc64le)'
49eb97
 
49eb97
@@ -30,7 +30,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85966-0
49eb97
     cce@rhel9: CCE-85968-6
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
index c8c532cb3bb..30279c88b23 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful file deletions (ppc64le)'
49eb97
 
49eb97
@@ -29,7 +29,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85969-4
49eb97
     cce@rhel9: CCE-85970-2
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
index 35362051948..220e5d9ca78 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful file deletions (ppc64le)'
49eb97
 
49eb97
@@ -28,7 +28,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85974-4
49eb97
     cce@rhel9: CCE-85976-9
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
index d5d11a0f214..ae0931dcee3 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful file modifications (ppc64le)'
49eb97
 
49eb97
@@ -33,7 +33,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85977-7
49eb97
     cce@rhel9: CCE-85978-5
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
index e45015e5949..4c4b1c7d8e0 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful file modifications (ppc64le)'
49eb97
 
49eb97
@@ -31,7 +31,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85979-3
49eb97
     cce@rhel9: CCE-85980-1
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
index 3f59eecec86..4f8b06c5e2f 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of loading and unloading of kernel modules (ppc64le)'
49eb97
 
49eb97
@@ -28,7 +28,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85981-9
49eb97
     cce@rhel9: CCE-85982-7
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
index 8d408578c3a..3fe9257c0cc 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Perform general configuration of Audit for OSPP (ppc64le)'
49eb97
 
49eb97
@@ -107,7 +107,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85983-5
49eb97
     cce@rhel9: CCE-85984-3
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
index 6324bb4fd3b..f0a7c78dd14 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful ownership changes (ppc64le)'
49eb97
 
49eb97
@@ -29,7 +29,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85985-0
49eb97
     cce@rhel9: CCE-85988-4
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
index 62639140885..dd0cf8d7cca 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_owner_change_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful ownership changes (ppc64le)'
49eb97
 
49eb97
@@ -28,7 +28,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85997-5
49eb97
     cce@rhel9: CCE-85998-3
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
index e55de06efc0..71e5354753e 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_failed_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of unsuccessful permission changes (ppc64le)'
49eb97
 
49eb97
@@ -29,7 +29,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-85999-1
49eb97
     cce@rhel9: CCE-86000-7
49eb97
 
49eb97
 references:
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
index 0cbb0f60e0c..282a2e316f4 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_perm_change_success_ppc64le/rule.yml
49eb97
@@ -1,6 +1,6 @@
49eb97
 documentation_complete: true
49eb97
 
49eb97
-prodtype: ol8,ol9,rhcos4,rhel8,rhel9
49eb97
+prodtype: rhel9
49eb97
 
49eb97
 title: 'Configure auditing of successful permission changes (ppc64le)'
49eb97
 
49eb97
@@ -28,7 +28,6 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel8: CCE-86001-5
49eb97
     cce@rhel9: CCE-86002-3
49eb97
 
49eb97
 references:
49eb97
49eb97
From 3b4bc8b3bec38c27e67bde1ad34ff42c85e7cd94 Mon Sep 17 00:00:00 2001
49eb97
From: Vojtech Polasek <vpolasek@redhat.com>
49eb97
Date: Mon, 18 Jul 2022 14:12:08 +0200
49eb97
Subject: [PATCH 18/18] fix CCE assignments after rebase
49eb97
49eb97
---
49eb97
 .../audit_access_failed_ppc64le/rule.yml      |  2 +-
49eb97
 .../audit_access_success_ppc64le/rule.yml     |  2 +-
49eb97
 .../audit_create_failed_ppc64le/rule.yml      |  2 +-
49eb97
 .../audit_create_success_ppc64le/rule.yml     |  2 +-
49eb97
 .../audit_delete_failed_ppc64le/rule.yml      |  2 +-
49eb97
 .../audit_delete_success_ppc64le/rule.yml     |  2 +-
49eb97
 .../audit_modify_failed_ppc64le/rule.yml      |  2 +-
49eb97
 .../audit_modify_success_ppc64le/rule.yml     |  2 +-
49eb97
 .../audit_module_load_ppc64le/rule.yml        |  2 +-
49eb97
 .../audit_ospp_general_ppc64le/rule.yml       |  2 +-
49eb97
 shared/references/cce-redhat-avail.txt        | 20 -------------------
49eb97
 11 files changed, 10 insertions(+), 30 deletions(-)
49eb97
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
index 6547b12e349..222290c9dd7 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_failed_ppc64le/rule.yml
49eb97
@@ -29,7 +29,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85955-3
49eb97
+    cce@rhel9: CCE-86001-5
49eb97
 
49eb97
 references:
49eb97
     ism: 0582,0584,05885,0586,0846,0957
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
index 6ec2fc3b32d..0091db466df 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_access_success_ppc64le/rule.yml
49eb97
@@ -29,7 +29,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85961-1
49eb97
+    cce@rhel9: CCE-85999-1
49eb97
 
49eb97
 references:
49eb97
     ism: 0582,0584,05885,0586,0846,0957
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
index 7af3f3b5bbb..c85274a3540 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_failed_ppc64le/rule.yml
49eb97
@@ -33,7 +33,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85965-2
49eb97
+    cce@rhel9: CCE-85997-5
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
index 87bfe3de933..54eb4be972d 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_create_success_ppc64le/rule.yml
49eb97
@@ -30,7 +30,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85968-6
49eb97
+    cce@rhel9: CCE-85985-0
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
index 30279c88b23..123a38cc0c6 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_failed_ppc64le/rule.yml
49eb97
@@ -29,7 +29,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85970-2
49eb97
+    cce@rhel9: CCE-90787-3
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
index 220e5d9ca78..f127ee47197 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_delete_success_ppc64le/rule.yml
49eb97
@@ -28,7 +28,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85976-9
49eb97
+    cce@rhel9: CCE-90789-9
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
index ae0931dcee3..22a90d645e3 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_failed_ppc64le/rule.yml
49eb97
@@ -33,7 +33,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85978-5
49eb97
+    cce@rhel9: CCE-90790-7
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
index 4c4b1c7d8e0..94b15c57c2f 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_modify_success_ppc64le/rule.yml
49eb97
@@ -31,7 +31,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85980-1
49eb97
+    cce@rhel9: CCE-90791-5
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
index 4f8b06c5e2f..486f0ba2d9e 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_module_load_ppc64le/rule.yml
49eb97
@@ -28,7 +28,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85982-7
49eb97
+    cce@rhel9: CCE-90788-1
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)
49eb97
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
index 3fe9257c0cc..cb712714c19 100644
49eb97
--- a/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
+++ b/linux_os/guide/system/auditing/policy_rules/audit_ospp_general_ppc64le/rule.yml
49eb97
@@ -107,7 +107,7 @@ platforms:
49eb97
     - ppc64le_arch
49eb97
 
49eb97
 identifiers:
49eb97
-    cce@rhel9: CCE-85984-3
49eb97
+    cce@rhel9: CCE-90786-5
49eb97
 
49eb97
 references:
49eb97
     nist: AU-2(a)