Blob Blame History Raw
From dc92e454b7c3e11b3545b86f1c78b26aeb3f82aa Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 28 Jan 2021 17:45:20 +0100
Subject: [PATCH 01/21] Add initial RHEL8 STIG V1R1 profile.

---
 .../auditing/service_auditd_enabled/rule.yml  |   1 +
 .../base/package_abrt_removed/rule.yml        |   1 +
 .../base/service_kdump_disabled/rule.yml      |   1 +
 .../package_fapolicyd_installed/rule.yml      |   1 +
 .../service_fapolicyd_enabled/rule.yml        |   1 +
 .../package_vsftpd_removed/rule.yml           |   1 +
 .../kerberos_disable_no_keytab/rule.yml       |   1 +
 .../mail/package_sendmail_removed/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../services/ntp/chronyd_client_only/rule.yml |   1 +
 .../ntp/chronyd_no_chronyc_network/rule.yml   |   1 +
 .../ntp/chronyd_or_ntpd_set_maxpoll/rule.yml  |   1 +
 .../r_services/no_host_based_files/rule.yml   |   1 +
 .../no_user_host_based_files/rule.yml         |   1 +
 .../package_rsh-server_removed/rule.yml       |   1 +
 .../package_telnet-server_removed/rule.yml    |   1 +
 .../tftp/package_tftp-server_removed/rule.yml |   1 +
 .../tftp/tftpd_uses_secure_mode/rule.yml      |   1 +
 .../rng/service_rngd_enabled/rule.yml         |   1 +
 .../rule.yml                                  |   1 +
 .../file_permissions_sshd_pub_key/rule.yml    |   1 +
 .../package_openssh-server_installed/rule.yml |   1 +
 .../ssh/service_sshd_enabled/rule.yml         |   1 +
 .../sshd_allow_only_protocol2/rule.yml        |   1 +
 .../sshd_disable_compression/rule.yml         |   1 +
 .../sshd_disable_gssapi_auth/rule.yml         |   1 +
 .../sshd_disable_kerb_auth/rule.yml           |   1 +
 .../sshd_disable_root_login/rule.yml          |   1 +
 .../sshd_disable_user_known_hosts/rule.yml    |   1 +
 .../sshd_disable_x11_forwarding/rule.yml      |   1 +
 .../sshd_do_not_permit_user_env/rule.yml      |   1 +
 .../sshd_enable_strictmodes/rule.yml          |   1 +
 .../sshd_enable_warning_banner/rule.yml       |   1 +
 .../ssh_server/sshd_print_last_log/rule.yml   |   1 +
 .../ssh/ssh_server/sshd_rekey_limit/rule.yml  |   1 +
 .../ssh_server/sshd_set_idle_timeout/rule.yml |   1 +
 .../ssh_server/sshd_set_keepalive/rule.yml    |   1 +
 .../sshd_x11_use_localhost/rule.yml           |   3 +-
 .../sssd/sssd_enable_smartcards/rule.yml      |   1 +
 .../sssd_offline_cred_expiration/rule.yml     |   1 +
 .../configure_usbguard_auditbackend/rule.yml  |   1 +
 .../package_usbguard_installed/rule.yml       |   1 +
 .../service_usbguard_enabled/rule.yml         |   1 +
 .../rule.yml                                  |   1 +
 .../banner_etc_issue/rule.yml                 |   1 +
 .../dconf_gnome_banner_enabled/rule.yml       |   1 +
 .../dconf_gnome_login_banner_text/rule.yml    |   1 +
 .../display_login_attempts/rule.yml           |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   2 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../accounts_password_pam_dcredit/rule.yml    |   1 +
 .../accounts_password_pam_difok/rule.yml      |   1 +
 .../accounts_password_pam_lcredit/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../accounts_password_pam_maxrepeat/rule.yml  |   1 +
 .../accounts_password_pam_minclass/rule.yml   |   1 +
 .../accounts_password_pam_minlen/rule.yml     |   1 +
 .../accounts_password_pam_ocredit/rule.yml    |   1 +
 .../accounts_password_pam_retry/rule.yml      |   1 +
 .../accounts_password_pam_ucredit/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../disable_ctrlaltdel_burstaction/rule.yml   |   1 +
 .../disable_ctrlaltdel_reboot/rule.yml        |   1 +
 .../require_emergency_target_auth/rule.yml    |   1 +
 .../require_singleuser_auth/rule.yml          |   1 +
 .../configure_bashrc_exec_tmux/rule.yml       |   1 +
 .../configure_tmux_lock_after_time/rule.yml   |   1 +
 .../configure_tmux_lock_command/rule.yml      |   1 +
 .../no_tmux_in_shells/rule.yml                |   1 +
 .../package_tmux_installed/rule.yml           |   1 +
 .../install_smartcard_packages/rule.yml       |   3 +-
 .../package_opensc_installed/rule.yml         |   1 +
 .../service_debug-shell_disabled/rule.yml     |   1 +
 .../rule.yml                                  |   1 +
 .../account_temp_expire_date/rule.yml         |   1 +
 .../accounts_maximum_age_login_defs/rule.yml  |   1 +
 .../accounts_minimum_age_login_defs/rule.yml  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../no_empty_passwords/rule.yml               |   1 +
 .../accounts_no_uid_except_zero/rule.yml      |   1 +
 .../accounts_have_homedir_login_defs/rule.yml |   1 +
 .../accounts_logon_fail_delay/rule.yml        |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../accounts_user_home_paths_only/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../file_permission_user_init_files/rule.yml  |   1 +
 .../rule.yml                                  |   1 +
 .../accounts_umask_etc_bashrc/rule.yml        |   1 +
 .../accounts_umask_etc_login_defs/rule.yml    |   1 +
 .../accounts_umask_interactive_users/rule.yml |   1 +
 .../audit_rules_login_events_lastlog/rule.yml |   1 +
 .../audit_rules_immutable/rule.yml            |   1 +
 .../audit_rules_sysadmin_actions/rule.yml     |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../file_ownership_var_log_audit/rule.yml     |   1 +
 .../file_permissions_var_log_audit/rule.yml   |   1 +
 .../auditd_data_disk_error_action/rule.yml    |   1 +
 .../auditd_data_disk_full_action/rule.yml     |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../auditd_data_retention_space_left/rule.yml |   1 +
 .../rule.yml                                  |   2 +
 .../auditd_local_events/rule.yml              |   1 +
 .../auditd_log_format/rule.yml                |   1 +
 .../auditd_name_format/rule.yml               |   1 +
 .../auditing/grub2_audit_argument/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../auditing/package_audit_installed/rule.yml |   1 +
 .../audit_immutable_login_uids/rule.yml       |   1 +
 .../auditing/service_auditd_enabled/rule.yml  |   1 +
 .../grub2_pti_argument/rule.yml               |   1 +
 .../grub2_vsyscall_argument/rule.yml          |   1 +
 .../non-uefi/grub2_admin_username/rule.yml    |   1 +
 .../non-uefi/grub2_password/rule.yml          |   1 +
 .../uefi/grub2_uefi_admin_username/rule.yml   |   1 +
 .../uefi/grub2_uefi_password/rule.yml         |   1 +
 .../rsyslog_cron_logging/rule.yml             |   1 +
 .../package_rsyslog-gnutls_installed/rule.yml |   1 +
 .../package_rsyslog_installed/rule.yml        |   1 +
 .../rsyslog_remote_loghost/rule.yml           |   1 +
 .../logging/service_rsyslog_enabled/rule.yml  |   1 +
 .../package_firewalld_installed/rule.yml      |   1 +
 .../service_firewalld_enabled/rule.yml        |   1 +
 .../configure_firewalld_ports/rule.yml        |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../sysctl_net_ipv4_ip_forward/rule.yml       |   1 +
 .../kernel_module_atm_disabled/rule.yml       |   1 +
 .../kernel_module_can_disabled/rule.yml       |   1 +
 .../rule.yml                                  |   1 +
 .../kernel_module_sctp_disabled/rule.yml      |   1 +
 .../kernel_module_tipc_disabled/rule.yml      |   1 +
 .../kernel_module_bluetooth_disabled/rule.yml |   1 +
 .../wireless_disable_interfaces/rule.yml      |   1 +
 .../rule.yml                                  |   1 +
 .../network/network_sniffer_disabled/rule.yml |   1 +
 .../rule.yml                                  |   1 +
 .../file_permissions_ungroupowned/rule.yml    |   1 +
 .../files/no_files_unowned_by_user/rule.yml   |   1 +
 .../file_ownership_binary_dirs/rule.yml       |   1 +
 .../file_ownership_library_dirs/rule.yml      |   1 +
 .../file_permissions_binary_dirs/rule.yml     |   1 +
 .../file_permissions_library_dirs/rule.yml    |   1 +
 .../sysctl_fs_protected_hardlinks/rule.yml    |   1 +
 .../sysctl_fs_protected_symlinks/rule.yml     |   1 +
 .../kernel_module_cramfs_disabled/rule.yml    |   1 +
 .../rule.yml                                  |   1 +
 .../mounting/service_autofs_disabled/rule.yml |   1 +
 .../mount_option_boot_nosuid/rule.yml         |   1 +
 .../mount_option_dev_shm_nodev/rule.yml       |   1 +
 .../mount_option_dev_shm_noexec/rule.yml      |   1 +
 .../mount_option_dev_shm_nosuid/rule.yml      |   1 +
 .../mount_option_home_nosuid/rule.yml         |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../mount_option_tmp_nodev/rule.yml           |   1 +
 .../mount_option_tmp_noexec/rule.yml          |   1 +
 .../mount_option_tmp_nosuid/rule.yml          |   1 +
 .../mount_option_var_log_audit_nodev/rule.yml |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../mount_option_var_log_nodev/rule.yml       |   1 +
 .../mount_option_var_log_noexec/rule.yml      |   1 +
 .../mount_option_var_log_nosuid/rule.yml      |   1 +
 .../mount_option_var_tmp_nodev/rule.yml       |   1 +
 .../mount_option_var_tmp_noexec/rule.yml      |   1 +
 .../mount_option_var_tmp_nosuid/rule.yml      |   1 +
 .../coredump_disable_backtraces/rule.yml      |   1 +
 .../coredump_disable_storage/rule.yml         |   1 +
 .../disable_users_coredumps/rule.yml          |   1 +
 .../rule.yml                                  |   1 +
 .../sysctl_kernel_kptr_restrict/rule.yml      |   1 +
 .../sysctl_kernel_randomize_va_space/rule.yml |   1 +
 .../grub2_page_poison_argument/rule.yml       |   1 +
 .../grub2_slub_debug_argument/rule.yml        |   1 +
 .../sysctl_kernel_core_pattern/rule.yml       |   1 +
 .../sysctl_kernel_dmesg_restrict/rule.yml     |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../sysctl_kernel_yama_ptrace_scope/rule.yml  |   1 +
 .../sysctl_user_max_user_namespaces/rule.yml  |   1 +
 .../rule.yml                                  |   1 +
 .../selinux/selinux_policytype/rule.yml       |   1 +
 .../system/selinux/selinux_state/rule.yml     |   1 +
 .../encrypt_partitions/rule.yml               |   1 +
 .../partition_for_home/rule.yml               |   1 +
 .../partition_for_tmp/rule.yml                |   1 +
 .../partition_for_var/rule.yml                |   1 +
 .../partition_for_var_log/rule.yml            |   2 +
 .../partition_for_var_log_audit/rule.yml      |   3 +
 .../partition_for_var_tmp/rule.yml            |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../installed_OS_is_vendor_supported/rule.yml |   1 +
 .../crypto/ssh_client_rekey_limit/rule.yml    |   1 +
 .../integrity/fips/enable_fips_mode/rule.yml  |   1 +
 .../fips/grub2_enable_fips_mode/rule.yml      |   1 +
 .../fips/sysctl_crypto_fips_enabled/rule.yml  |   1 +
 .../aide/aide_scan_notification/rule.yml      |   1 +
 .../aide/aide_verify_acls/rule.yml            |   1 +
 .../aide/aide_verify_ext_attributes/rule.yml  |   1 +
 .../aide/package_aide_installed/rule.yml      |   1 +
 .../accounts_authorized_local_users/rule.yml  |   3 +
 .../sudo/sudo_remove_no_authenticate/rule.yml |   1 +
 .../sudo/sudo_remove_nopasswd/rule.yml        |   1 +
 .../package_abrt-addon-ccpp_removed/rule.yml  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../package_abrt-cli_removed/rule.yml         |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../rule.yml                                  |   1 +
 .../package_gssproxy_removed/rule.yml         |   3 +-
 .../package_iprutils_removed/rule.yml         |   1 +
 .../package_krb5-workstation_removed/rule.yml |   1 +
 .../package_tuned_removed/rule.yml            |   1 +
 .../clean_components_post_updating/rule.yml   |   1 +
 .../rule.yml                                  |   1 +
 .../ensure_gpgcheck_local_packages/rule.yml   |   1 +
 .../security_patches_up_to_date/rule.yml      |   1 +
 rhel8/profiles/stig.profile                   | 310 ++++++++++++++++--
 259 files changed, 543 insertions(+), 38 deletions(-)

diff --git a/apple_os/auditing/service_auditd_enabled/rule.yml b/apple_os/auditing/service_auditd_enabled/rule.yml
index bbb5132b5f..0c34cae438 100644
--- a/apple_os/auditing/service_auditd_enabled/rule.yml
+++ b/apple_os/auditing/service_auditd_enabled/rule.yml
@@ -35,6 +35,7 @@ references:
     nist: AU-3,AU-3(1),AU-8(a),AU-8(b),AU-12(3),AU-14(1)
     srg: SRG-OS-000037-GPOS-00015,SRG-OS-000038-GPOS-00016,SRG-OS-000039-GPOS-00017,SRG-OS-000040-GPOS-00018,SRG-OS-000041-GPOS-00019,SRG-OS-000042-GPOS-00020,SRG-OS-000042-GPOS-00021,SRG-OS-000055-GPOS-00026,SRG-OS-000254-GPOS-00095,SRG-OS-000255-GPOS-00096,SRG-OS-000303-GPOS-00120,SRG-OS-000337-GPOS-00129,SRG-OS-000358-GPOS-00145,SRG-OS-000359-GPOS-00146
     stigid: AOSX-14-001013
+    stigid@rhel8: RHEL-08-010560
 
 ocil_clause: 'auditing is not enabled or running'
 
diff --git a/linux_os/guide/services/base/package_abrt_removed/rule.yml b/linux_os/guide/services/base/package_abrt_removed/rule.yml
index 3cee145e25..03f8a5b6a0 100644
--- a/linux_os/guide/services/base/package_abrt_removed/rule.yml
+++ b/linux_os/guide/services/base/package_abrt_removed/rule.yml
@@ -25,6 +25,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt") }}}
 
diff --git a/linux_os/guide/services/base/service_kdump_disabled/rule.yml b/linux_os/guide/services/base/service_kdump_disabled/rule.yml
index ff9d439b4f..8676710018 100644
--- a/linux_os/guide/services/base/service_kdump_disabled/rule.yml
+++ b/linux_os/guide/services/base/service_kdump_disabled/rule.yml
@@ -39,6 +39,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.9.1.2
     cis-csc: 11,12,14,15,3,8,9
     ospp: FMT_SMF_EXT.1.1
+    stigid@rhel8: RHEL-08-010670
 
 ocil: '{{{ ocil_service_disabled(service="kdump") }}}'
 
diff --git a/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml b/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
index 5869cac7ab..a35cb48f83 100644
--- a/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
+++ b/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
@@ -20,6 +20,7 @@ identifiers:
 references:
     nist: CM-6(a),SI-4(22)
     srg: SRG-OS-000370-GPOS-00155
+    stigid@rhel8: RHEL-08-040135
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/services/fapolicyd/service_fapolicyd_enabled/rule.yml b/linux_os/guide/services/fapolicyd/service_fapolicyd_enabled/rule.yml
index 11f2e9cf7a..44b97a8d6f 100644
--- a/linux_os/guide/services/fapolicyd/service_fapolicyd_enabled/rule.yml
+++ b/linux_os/guide/services/fapolicyd/service_fapolicyd_enabled/rule.yml
@@ -22,6 +22,7 @@ references:
     nist: CM-6(a),SI-4(22)
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000370-GPOS-00155
+    stigid@rhel8: RHEL-08-040135
 
 ocil_clause: 'the service is not enabled'
 
diff --git a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
index 737d9b9cb6..dc7d79af44 100644
--- a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
+++ b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
@@ -28,6 +28,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS05.02,DSS05.05,DSS06.06
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
+    stigid@rhel8: RHEL-08-040360
 
 {{{ complete_ocil_entry_package(package="vsftpd") }}}
 
diff --git a/linux_os/guide/services/kerberos/kerberos_disable_no_keytab/rule.yml b/linux_os/guide/services/kerberos/kerberos_disable_no_keytab/rule.yml
index c552fa7889..d29370c9e9 100644
--- a/linux_os/guide/services/kerberos/kerberos_disable_no_keytab/rule.yml
+++ b/linux_os/guide/services/kerberos/kerberos_disable_no_keytab/rule.yml
@@ -20,6 +20,7 @@ references:
     ospp: FTP_ITC_EXT.1
     srg: SRG-OS-000120-GPOS-00061
     ism: 0418,1055,1402
+    stigid@rhel8: RHEL-08-010161
 
 ocil_clause: 'it is present on the system'
 
diff --git a/linux_os/guide/services/mail/package_sendmail_removed/rule.yml b/linux_os/guide/services/mail/package_sendmail_removed/rule.yml
index 1b62fb49fb..ed29daa2f6 100644
--- a/linux_os/guide/services/mail/package_sendmail_removed/rule.yml
+++ b/linux_os/guide/services/mail/package_sendmail_removed/rule.yml
@@ -30,6 +30,7 @@ references:
     cis-csc: 11,14,3,9
     anssi: BP28(R1)
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-040002
 
 {{{ complete_ocil_entry_package(package="sendmail") }}}
 
diff --git a/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml b/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
index 1c4bfb60bf..96601ebb87 100644
--- a/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
+++ b/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
@@ -31,6 +31,7 @@ references:
     disa@sle12: CCI-000139
     nist@sle12: AU-5(a),AU-5.1(ii)
     anssi: BP28(R49)
+    stigid@rhel8: RHEL-08-030030
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml b/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
index c2357fe9ee..4bfcc16c7f 100644
--- a/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
+++ b/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
@@ -24,6 +24,7 @@ references:
     disa: CCI-000366
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-040680
+    stigid@rhel8: RHEL-08-040290
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
index b3be78ef91..3349a7963a 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
@@ -23,6 +23,7 @@ references:
     cobit5: APO13.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS05.02,DSS05.05,DSS05.06,DSS06.06
     iso27001-2013: A.11.2.9,A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.8.2.1,A.8.2.2,A.8.2.3,A.8.3.1,A.8.3.3,A.9.1.2
     cis-csc: 11,13,14,3,8,9
+    stigid@rhel8: RHEL-08-010640
 
 ocil_clause: 'the setting does not show'
 
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
index d9c17fb416..ee6b9aa54a 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
@@ -31,6 +31,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@sle12: SLES-12-010820
+    stigid@rhel8: RHEL-08-010630
 
 ocil_clause: 'the setting does not show'
 
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
index c14b0aeefb..6b71f94c2b 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
@@ -29,6 +29,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@sle12: SLES-12-010810
+    stigid@rhel8: RHEL-08-010650
 
 ocil_clause: 'the setting does not show'
 
diff --git a/linux_os/guide/services/ntp/chronyd_client_only/rule.yml b/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
index 76e13f8eb1..071934387c 100644
--- a/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000096-GPOS-00050
+    stigid@rhel8: RHEL-08-030741
 
 ocil_clause: 'it does not exist or port is set to non-zero value'
 
diff --git a/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml b/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
index 1312c1cfb5..cbc9cc670c 100644
--- a/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000096-GPOS-00050
+    stigid@rhel8: RHEL-08-030742
 
 ocil_clause: 'it does not exist or port is set to non-zero value'
 
diff --git a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
index 4e4be3002f..9a802b5d5d 100644
--- a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
@@ -42,6 +42,7 @@ references:
     cis-csc: 1,14,15,16,3,5,6
     stigid@sle12: SLES-12-030300
     nist@sle12: AU-8(1)(a),AU-8(1)(b)
+    stigid@rhel8: RHEL-08-030740
 
 ocil_clause: 'it does not exist or maxpoll has not been set to the expected value'
 
diff --git a/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml b/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
index 9891cedab0..01eb9e5f99 100644
--- a/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
+++ b/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
@@ -29,6 +29,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-040550
     stigid@sle12: SLES-12-010410
+    stigid@rhel8: RHEL-08-010460
 
 ocil_clause: 'these files exist'
 
diff --git a/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml b/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
index a7f4996f3b..48bff043a6 100644
--- a/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
+++ b/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
@@ -30,6 +30,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-040540
     stigid@sle12: SLES-12-010400
+    stigid@rhel8: RHEL-08-010470
 
 ocil_clause: 'these files exist'
 
diff --git a/linux_os/guide/services/obsolete/r_services/package_rsh-server_removed/rule.yml b/linux_os/guide/services/obsolete/r_services/package_rsh-server_removed/rule.yml
index e5deb01ddb..23d30cb5af 100644
--- a/linux_os/guide/services/obsolete/r_services/package_rsh-server_removed/rule.yml
+++ b/linux_os/guide/services/obsolete/r_services/package_rsh-server_removed/rule.yml
@@ -34,6 +34,7 @@ references:
     isa-62443-2009: 4.3.3.5.1,4.3.3.5.2,4.3.3.5.3,4.3.3.5.4,4.3.3.5.5,4.3.3.5.6,4.3.3.5.7,4.3.3.5.8,4.3.3.6.1,4.3.3.6.2,4.3.3.6.3,4.3.3.6.4,4.3.3.6.5,4.3.3.6.6,4.3.3.6.7,4.3.3.6.8,4.3.3.6.9,4.3.3.7.1,4.3.3.7.2,4.3.3.7.3,4.3.3.7.4,4.3.4.3.2,4.3.4.3.3
     cobit5: APO13.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.04,DSS05.02,DSS05.03,DSS05.05,DSS06.06
     cis-csc: 11,12,14,15,3,8,9
+    stigid@rhel8: RHEL-08-040010
 
 {{{ complete_ocil_entry_package(package="rsh-server") }}}
 
diff --git a/linux_os/guide/services/obsolete/telnet/package_telnet-server_removed/rule.yml b/linux_os/guide/services/obsolete/telnet/package_telnet-server_removed/rule.yml
index 619b3f0b7d..f42bcba15e 100644
--- a/linux_os/guide/services/obsolete/telnet/package_telnet-server_removed/rule.yml
+++ b/linux_os/guide/services/obsolete/telnet/package_telnet-server_removed/rule.yml
@@ -44,6 +44,7 @@ references:
     isa-62443-2009: 4.3.3.5.1,4.3.3.5.2,4.3.3.5.3,4.3.3.5.4,4.3.3.5.5,4.3.3.5.6,4.3.3.5.7,4.3.3.5.8,4.3.3.6.1,4.3.3.6.2,4.3.3.6.3,4.3.3.6.4,4.3.3.6.5,4.3.3.6.6,4.3.3.6.7,4.3.3.6.8,4.3.3.6.9,4.3.3.7.1,4.3.3.7.2,4.3.3.7.3,4.3.3.7.4,4.3.4.3.2,4.3.4.3.3
     cobit5: APO13.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.04,DSS05.02,DSS05.03,DSS05.05,DSS06.06
     cis-csc: 11,12,14,15,3,8,9
+    stigid@rhel8: RHEL-08-040000
 
 {{{ complete_ocil_entry_package(package="telnet-server") }}}
 
diff --git a/linux_os/guide/services/obsolete/tftp/package_tftp-server_removed/rule.yml b/linux_os/guide/services/obsolete/tftp/package_tftp-server_removed/rule.yml
index 57f3c0f8bc..2d0258db1e 100644
--- a/linux_os/guide/services/obsolete/tftp/package_tftp-server_removed/rule.yml
+++ b/linux_os/guide/services/obsolete/tftp/package_tftp-server_removed/rule.yml
@@ -33,6 +33,7 @@ references:
     cobit5: APO13.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.04,DSS05.02,DSS05.03,DSS05.05,DSS06.06
     iso27001-2013: A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.9.1.2
     cis-csc: 11,12,14,15,3,8,9
+    stigid@rhel8: RHEL-08-040190
 
 {{{ complete_ocil_entry_package(package="tftp-server") }}}
 
diff --git a/linux_os/guide/services/obsolete/tftp/tftpd_uses_secure_mode/rule.yml b/linux_os/guide/services/obsolete/tftp/tftpd_uses_secure_mode/rule.yml
index b2d87944f1..24cefbb6f9 100644
--- a/linux_os/guide/services/obsolete/tftp/tftpd_uses_secure_mode/rule.yml
+++ b/linux_os/guide/services/obsolete/tftp/tftpd_uses_secure_mode/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: APO01.06,APO13.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.04,DSS05.02,DSS05.03,DSS05.04,DSS05.05,DSS05.07,DSS06.02,DSS06.06
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.6.1.2,A.6.2.1,A.6.2.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 11,12,13,14,15,16,18,3,5,8,9
+    stigid@rhel8: RHEL-08-040350
 
 ocil_clause: 'this flag is missing'
 
diff --git a/linux_os/guide/services/rng/service_rngd_enabled/rule.yml b/linux_os/guide/services/rng/service_rngd_enabled/rule.yml
index 1cc21d0d00..feebdff4eb 100644
--- a/linux_os/guide/services/rng/service_rngd_enabled/rule.yml
+++ b/linux_os/guide/services/rng/service_rngd_enabled/rule.yml
@@ -21,6 +21,7 @@ identifiers:
 references:
     ospp: FCS_RBG_EXT.1
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010471
 
 ocil_clause: 'the service is not enabled'
 
diff --git a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
index d460411667..5397a3fdce 100644
--- a/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
+++ b/linux_os/guide/services/ssh/file_permissions_sshd_private_key/rule.yml
@@ -35,6 +35,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     cis@rhel8: 5.2.3
+    stigid@rhel8: RHEL-08-010490
 
 ocil_clause: '{{{ ocil_clause_file_permissions(file="/etc/ssh/*_key", perms="-rw-r-----") }}}'
 
diff --git a/linux_os/guide/services/ssh/file_permissions_sshd_pub_key/rule.yml b/linux_os/guide/services/ssh/file_permissions_sshd_pub_key/rule.yml
index b9e07d71af..d49e375df4 100644
--- a/linux_os/guide/services/ssh/file_permissions_sshd_pub_key/rule.yml
+++ b/linux_os/guide/services/ssh/file_permissions_sshd_pub_key/rule.yml
@@ -30,6 +30,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     cis@rhel8: 5.2.4
+    stigid@rhel8: RHEL-08-010480
 
 ocil_clause: '{{{ ocil_clause_file_permissions(file="/etc/ssh/*.pub", perms="-rw-r--r--") }}}'
 
diff --git a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
index 84882d52b3..4fda79df25 100644
--- a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
+++ b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
@@ -31,6 +31,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 13,14
     ospp: FIA_UAU.5,FTP_ITC_EXT.1
+    stigid@rhel8: RHEL-08-040160
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/services/ssh/service_sshd_enabled/rule.yml b/linux_os/guide/services/ssh/service_sshd_enabled/rule.yml
index f0e258bf04..81d63480c3 100644
--- a/linux_os/guide/services/ssh/service_sshd_enabled/rule.yml
+++ b/linux_os/guide/services/ssh/service_sshd_enabled/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: APO01.06,DSS05.02,DSS05.04,DSS05.07,DSS06.02,DSS06.06
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 13,14
+    stigid@rhel8: RHEL-08-040160
 
 ocil: '{{{ ocil_service_enabled(service="sshd") }}}'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_allow_only_protocol2/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_allow_only_protocol2/rule.yml
index 2f5bdfdee3..fc6175e446 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_allow_only_protocol2/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_allow_only_protocol2/rule.yml
@@ -41,6 +41,7 @@ references:
     iso27001-2013: A.11.2.6,A.13.1.1,A.13.2.1,A.14.1.3,A.18.1.4,A.6.2.1,A.6.2.2,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5,8
     ism: 0487,1449,1506
+    stigid@rhel8: RHEL-08-040060
 
 ocil_clause: 'it is commented out or is not set correctly to Protocol 2'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_compression/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_compression/rule.yml
index f8eec6a074..9e4e2f48b4 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_compression/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_compression/rule.yml
@@ -39,6 +39,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
+    stigid@rhel8: RHEL-08-010510
 
 ocil_clause: 'it is commented out, or is not set to no or delayed'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_gssapi_auth/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_gssapi_auth/rule.yml
index c79d0b5e07..f9ece13f51 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_gssapi_auth/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_gssapi_auth/rule.yml
@@ -36,6 +36,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
     ism: 0418,1055,1402
+    stigid@rhel8: RHEL-08-010521
 
 ocil_clause: 'it is commented out or is not disabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
index 1f1380127c..50eb7a28cb 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
@@ -37,6 +37,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-010521
 
 ocil_clause: 'it is commented out or is not disabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_root_login/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_root_login/rule.yml
index 287954db61..8360f5fa34 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_root_login/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_root_login/rule.yml
@@ -46,6 +46,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.18.1.4,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,3,5
     anssi: BP28(R19),NT007(R21)
+    stigid@rhel8: RHEL-08-010550
 
 {{{ complete_ocil_entry_sshd_option(default="no", option="PermitRootLogin", value="no") }}}
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_user_known_hosts/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_user_known_hosts/rule.yml
index 93ff19deff..b55e749139 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_user_known_hosts/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_user_known_hosts/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
+    stigid@rhel8: RHEL-08-010520
 
 {{{ complete_ocil_entry_sshd_option(default="no", option="IgnoreUserKnownHosts", value="yes") }}}
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
index 5d01170aab..14f0270c78 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_x11_forwarding/rule.yml
@@ -37,6 +37,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     disa: CCI-000366
     nist: CM-6(b)
+    stigid@rhel8: RHEL-08-040340
 
 template:
     name: sshd_lineinfile
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_do_not_permit_user_env/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_do_not_permit_user_env/rule.yml
index e5d54261d3..b1d33d3f86 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_do_not_permit_user_env/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_do_not_permit_user_env/rule.yml
@@ -39,6 +39,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
+    stigid@rhel8: RHEL-08-010830
 
 ocil_clause: 'PermitUserEnvironment is not disabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_enable_strictmodes/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_enable_strictmodes/rule.yml
index 601f6a0ca2..9eeb8f8985 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_enable_strictmodes/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_enable_strictmodes/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-010500
 
 ocil_clause: 'it is commented out or is not enabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_enable_warning_banner/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_enable_warning_banner/rule.yml
index c93ef6340f..2eb688c1ec 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_enable_warning_banner/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_enable_warning_banner/rule.yml
@@ -43,6 +43,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-010040
 
 {{{ complete_ocil_entry_sshd_option(default="no", option="Banner", value="/etc/issue") }}}
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_print_last_log/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_print_last_log/rule.yml
index 0ce5da30b2..cb15b1e9e9 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_print_last_log/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_print_last_log/rule.yml
@@ -32,6 +32,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-020350
 
 ocil_clause: 'it is commented out or is not enabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_rekey_limit/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_rekey_limit/rule.yml
index d7941f9c0e..f3f15251b2 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_rekey_limit/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_rekey_limit/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     ospp: FCS_SSHS_EXT.1
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-040161
 
 ocil_clause: 'it is commented out or is not set'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
index 7c6cb7a2d0..19151f0273 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_set_idle_timeout/rule.yml
@@ -52,6 +52,7 @@ references:
     iso27001-2013: A.12.4.1,A.12.4.3,A.14.1.1,A.14.2.1,A.14.2.5,A.18.1.4,A.6.1.2,A.6.1.5,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5,7,8
     anssi: BP28(R29)
+    stigid@rhel8: RHEL-08-010200
 
 requires:
     - sshd_set_keepalive
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
index c43fce001a..8987c9b9ed 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: APO13.01,BAI03.01,BAI03.02,BAI03.03,DSS01.03,DSS03.05,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.12.4.1,A.12.4.3,A.14.1.1,A.14.2.1,A.14.2.5,A.18.1.4,A.6.1.2,A.6.1.5,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5,7,8
+    stigid@rhel8: RHEL-08-010200
 
 requires:
     - sshd_set_idle_timeout
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
index b0fe065d86..bee39a3904 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
@@ -1,6 +1,6 @@
 documentation_complete: true
 
-prodtype: fedora,ol7,rhel7
+prodtype: fedora,ol7,ol8,rhel7,rhel8
 
 title: 'Prevent remote hosts from connecting to the proxy display'
 
@@ -29,6 +29,7 @@ references:
     stig@ol7: OL07-00-040711
     disa: CCI-000366
     nist: CM-6(b)
+    stigid@rhel8: RHEL-08-040341
 
 ocil_clause: "the display proxy is listening on wildcard address"
 
diff --git a/linux_os/guide/services/sssd/sssd_enable_smartcards/rule.yml b/linux_os/guide/services/sssd/sssd_enable_smartcards/rule.yml
index 7a51b3960f..bcf9d58e62 100644
--- a/linux_os/guide/services/sssd/sssd_enable_smartcards/rule.yml
+++ b/linux_os/guide/services/sssd/sssd_enable_smartcards/rule.yml
@@ -38,6 +38,7 @@ references:
     srg: SRG-OS-000375-GPOS-00160
     vmmsrg: SRG-OS-000107-VMM-000530
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020250
 
 ocil_clause: 'smart cards are not enabled in SSSD'
 
diff --git a/linux_os/guide/services/sssd/sssd_offline_cred_expiration/rule.yml b/linux_os/guide/services/sssd/sssd_offline_cred_expiration/rule.yml
index b2c450b58e..09ee5187a6 100644
--- a/linux_os/guide/services/sssd/sssd_offline_cred_expiration/rule.yml
+++ b/linux_os/guide/services/sssd/sssd_offline_cred_expiration/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-020290
 
 ocil_clause: 'it does not exist or is not configured properly'
 
diff --git a/linux_os/guide/services/usbguard/configure_usbguard_auditbackend/rule.yml b/linux_os/guide/services/usbguard/configure_usbguard_auditbackend/rule.yml
index 2b87e7964f..b2fc36bbfc 100644
--- a/linux_os/guide/services/usbguard/configure_usbguard_auditbackend/rule.yml
+++ b/linux_os/guide/services/usbguard/configure_usbguard_auditbackend/rule.yml
@@ -23,6 +23,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000062-GPOS-00031
+    stigid@rhel8: RHEL-08-030603
 
 ocil_clause: 'AuditBackend is not set to LinuxAudit'
 
diff --git a/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml b/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
index f23176d83e..6806e0861d 100644
--- a/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
+++ b/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     srg: SRG-OS-000378-GPOS-00163
     ism: "1418"
+    stigid@rhel8: RHEL-08-040140
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/services/usbguard/service_usbguard_enabled/rule.yml b/linux_os/guide/services/usbguard/service_usbguard_enabled/rule.yml
index 3f357aa8b7..918a29945d 100644
--- a/linux_os/guide/services/usbguard/service_usbguard_enabled/rule.yml
+++ b/linux_os/guide/services/usbguard/service_usbguard_enabled/rule.yml
@@ -24,6 +24,7 @@ references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000378-GPOS-00163
     ism: "1418"
+    stigid@rhel8: RHEL-08-040140
 
 ocil_clause: 'the service is not enabled'
 
diff --git a/linux_os/guide/services/xwindows/disabling_xwindows/package_xorg-x11-server-common_removed/rule.yml b/linux_os/guide/services/xwindows/disabling_xwindows/package_xorg-x11-server-common_removed/rule.yml
index 2c34030cdb..789b84643a 100644
--- a/linux_os/guide/services/xwindows/disabling_xwindows/package_xorg-x11-server-common_removed/rule.yml
+++ b/linux_os/guide/services/xwindows/disabling_xwindows/package_xorg-x11-server-common_removed/rule.yml
@@ -40,6 +40,7 @@ references:
     iso27001-2013: A.11.2.6,A.13.1.1,A.13.2.1,A.14.1.3,A.6.2.1,A.6.2.2
     cis-csc: 12,15,8
     cis@sle15: 2.2.2
+    stigid@rhel8: RHEL-08-040320
 
 ocil_clause: 'the X Windows package group or xorg-x11-server-common has not be removed'
 
diff --git a/linux_os/guide/system/accounts/accounts-banners/banner_etc_issue/rule.yml b/linux_os/guide/system/accounts/accounts-banners/banner_etc_issue/rule.yml
index 637d8ee528..5e00846773 100644
--- a/linux_os/guide/system/accounts/accounts-banners/banner_etc_issue/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-banners/banner_etc_issue/rule.yml
@@ -71,6 +71,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-010060
 
 ocil_clause: 'it does not display the required banner'
 
diff --git a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
index 47c4edad90..c364bdb9e1 100644
--- a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
@@ -49,6 +49,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-010050
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_login_banner_text/rule.yml b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_login_banner_text/rule.yml
index c600620f18..135f15e1be 100644
--- a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_login_banner_text/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_login_banner_text/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-010050
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/display_login_attempts/rule.yml b/linux_os/guide/system/accounts/accounts-pam/display_login_attempts/rule.yml
index 3ba5b642db..a6eefa9c15 100644
--- a/linux_os/guide/system/accounts/accounts-pam/display_login_attempts/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/display_login_attempts/rule.yml
@@ -38,6 +38,7 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0582,0584,05885,0586,0846,0957
+    stigid@rhel8: RHEL-08-020340
 
 ocil_clause: 'that is not the case'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/rule.yml
index 1669db1231..78247557de 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/rule.yml
@@ -46,6 +46,7 @@ references:
     cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-020220
 
 ocil_clause: 'the value of remember is not set equal to or greater than the expected setting'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny/rule.yml
index ccee5dd048..85a0ba18a3 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny/rule.yml
@@ -47,6 +47,7 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020010
 
 ocil_clause: 'that is not the case'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
index 882b57654e..4b7ee01946 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
@@ -44,6 +44,8 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020010
+    stigid@rhel8: RHEL-08-020022
 
 ocil_clause: 'that is not the case'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_interval/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_interval/rule.yml
index d1b9c396ae..6bc0f02afc 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_interval/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_interval/rule.yml
@@ -53,6 +53,7 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020012
 
 ocil_clause: 'fail_interval is less than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_unlock_time/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_unlock_time/rule.yml
index 2fff1c6011..ead8f697f4 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_unlock_time/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_unlock_time/rule.yml
@@ -50,6 +50,7 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020014
 
 ocil_clause: 'unlock_time is less than the expected value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_dcredit/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_dcredit/rule.yml
index 8519b72a6b..11040cfa87 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_dcredit/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_dcredit/rule.yml
@@ -46,6 +46,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020130
 
 ocil_clause: 'dcredit is not found or not equal to or less than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_difok/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_difok/rule.yml
index fb64b61520..d659f480d2 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_difok/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_difok/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-020170
 
 ocil_clause: 'difok is not found or not equal to or greater than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_lcredit/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_lcredit/rule.yml
index 26fc519e3d..086354372f 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_lcredit/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_lcredit/rule.yml
@@ -45,6 +45,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020120
 
 ocil_clause: 'lcredit is not found or not less than or equal to the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
index d449c97950..5bac335e2d 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxclassrepeat/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-020140
 
 ocil_clause: 'that is not the case'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxrepeat/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxrepeat/rule.yml
index cb2755b255..42d5584a9d 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxrepeat/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_maxrepeat/rule.yml
@@ -40,6 +40,7 @@ references:
     cobit5: DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-020150
 
 ocil_clause: 'maxrepeat is not found or not greater than or equal to the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minclass/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minclass/rule.yml
index dfd34c893e..3e71d9094b 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minclass/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minclass/rule.yml
@@ -53,6 +53,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020160
 
 ocil_clause: 'minclass is not found or not set equal to or greater than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minlen/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minlen/rule.yml
index 0776e196f6..a79a03f374 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minlen/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_minlen/rule.yml
@@ -44,6 +44,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020230
 
 ocil_clause: 'minlen is not found, or not equal to or greater than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ocredit/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ocredit/rule.yml
index b82667936b..dd05085fa3 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ocredit/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ocredit/rule.yml
@@ -46,6 +46,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020280
 
 ocil_clause: 'ocredit is not found or not equal to or less than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
index 6b1534adde..90f74b2d3c 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_retry/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,11,12,15,16,3,5,9
+    stigid@rhel8: RHEL-08-020100
 
 ocil_clause: 'it is not the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ucredit/rule.yml b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ucredit/rule.yml
index c2d8f3a1eb..5a656a42a0 100644
--- a/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ucredit/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/password_quality/password_quality_pwquality/accounts_password_pam_ucredit/rule.yml
@@ -43,6 +43,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020110
 
 ocil_clause: 'ucredit is not found or not set less than or equal to the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_logindefs/rule.yml b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_logindefs/rule.yml
index 96ffec0eaa..bbfcd7fc28 100644
--- a/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_logindefs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/set_password_hashing_algorithm/set_password_hashing_algorithm_logindefs/rule.yml
@@ -42,6 +42,7 @@ references:
     cis-csc: 1,12,15,16,5
     anssi: BP28(R32)
     ism: 0418,1055,1402
+    stigid@rhel8: RHEL-08-010110
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_burstaction/rule.yml b/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_burstaction/rule.yml
index a9e86f2ddd..7192666fc8 100644
--- a/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_burstaction/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_burstaction/rule.yml
@@ -37,6 +37,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-040172
 
 ocil_clause: 'the system is configured to reboot when Ctrl-Alt-Del is pressed more than 7 times in 2 seconds.'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_reboot/rule.yml b/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_reboot/rule.yml
index 5824f7b2ca..6066c9391b 100644
--- a/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_reboot/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/disable_ctrlaltdel_reboot/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-040170
 
 ocil_clause: 'the system is configured to reboot when Ctrl-Alt-Del is pressed'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml b/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
index f9959f0720..2e902739ae 100644
--- a/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
@@ -42,6 +42,7 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-010151
 
 ocil_clause: 'the output is different'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/require_singleuser_auth/rule.yml b/linux_os/guide/system/accounts/accounts-physical/require_singleuser_auth/rule.yml
index b3afff50c5..8acaaa862c 100644
--- a/linux_os/guide/system/accounts/accounts-physical/require_singleuser_auth/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/require_singleuser_auth/rule.yml
@@ -44,6 +44,7 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-010151
 
 ocil_clause: 'the output is different'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
index 21edfc9f0b..2582145a8c 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_bashrc_exec_tmux/rule.yml
@@ -21,6 +21,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000031-GPOS-00012
+    stigid@rhel8: RHEL-08-020041
 
 ocil_clause: 'exec tmux is not present at the end of bashrc'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_after_time/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_after_time/rule.yml
index 7816ebc8f9..fe99051eb6 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_after_time/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_after_time/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000029-GPOS-00010
+    stigid@rhel8: RHEL-08-020070
 
 ocil_clause: 'lock-after-time is not set or set to zero'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_command/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_command/rule.yml
index bf1ea79df9..88ce99f41b 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_command/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/configure_tmux_lock_command/rule.yml
@@ -26,6 +26,7 @@ identifiers:
 references:
     disa: CCI-000056,CCI-000058
     nist: AC-11(a),AC-11(b),CM-6(a)
+    stigid@rhel8: RHEL-08-020040
 
     vmmsrg: SRG-OS-000028-VMM-000090,SRG-OS-000030-VMM-000110
     srg: SRG-OS-000028-GPOS-00009
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/no_tmux_in_shells/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/no_tmux_in_shells/rule.yml
index 596126aafa..ecd9e8f147 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/no_tmux_in_shells/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/no_tmux_in_shells/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000324-GPOS-00125
+    stigid@rhel8: RHEL-08-020042
 
 ocil_clause: 'tmux is listed in /etc/shells'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
index c900612b1b..d57802a37e 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
@@ -40,6 +40,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-020040
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
index b3210d6adc..29aa49483d 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
@@ -1,6 +1,6 @@
 documentation_complete: true
 
-prodtype: fedora,ol7,rhel7
+prodtype: fedora,ol7,rhel7,rhel8
 
 title: 'Install Smart Card Packages For Multifactor Authentication'
 
@@ -32,6 +32,7 @@ references:
     nist: CM-6(a)
     srg: SRG-OS-000105-GPOS-00052,SRG-OS-000375-GPOS-00160,SRG-OS-000375-GPOS-00161,SRG-OS-000377-GPOS-00162
     stigid@rhel7: RHEL-07-041001
+    stigid@rhel8: RHEL-08-010390
 
 ocil_clause: 'smartcard software is not installed'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/package_opensc_installed/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/package_opensc_installed/rule.yml
index 2770b637f0..74da38fa22 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/package_opensc_installed/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/package_opensc_installed/rule.yml
@@ -31,6 +31,7 @@ references:
     srg: SRG-OS-000375-GPOS-00160
     vmmsrg: SRG-OS-000376-VMM-001520
     ism: 1382,1384,1386
+    stigid@rhel8: RHEL-08-010410
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/service_debug-shell_disabled/rule.yml b/linux_os/guide/system/accounts/accounts-physical/service_debug-shell_disabled/rule.yml
index 0f22245e6f..1f712eed7e 100644
--- a/linux_os/guide/system/accounts/accounts-physical/service_debug-shell_disabled/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/service_debug-shell_disabled/rule.yml
@@ -32,6 +32,7 @@ references:
     hipaa: 164.308(a)(1)(ii)(B),164.308(a)(7)(i),164.308(a)(7)(ii)(A),164.310(a)(1),164.310(a)(2)(i),164.310(a)(2)(ii),164.310(a)(2)(iii),164.310(b),164.310(c),164.310(d)(1),164.310(d)(2)(iii)
     ospp: FIA_UAU.1
     srg: SRG-OS-000324-GPOS-00125
+    stigid@rhel8: RHEL-08-040180
 
 ocil: '{{{ ocil_service_disabled(service="debug-shell") }}}'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_disable_post_pw_expiration/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_disable_post_pw_expiration/rule.yml
index add8ac0dbd..7e6b5d794e 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_disable_post_pw_expiration/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_disable_post_pw_expiration/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: DSS01.03,DSS03.05,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.12.4.1,A.12.4.3,A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5,7,8
+    stigid@rhel8: RHEL-08-020260
 
 ocil_clause: 'the value of INACTIVE is greater than the expected value'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
index b647776778..ced7a52a67 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
@@ -44,6 +44,7 @@ references:
     iso27001-2013: A.12.4.1,A.12.4.3,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5,7,8
     stigid@sle12: SLES-12-010360
+    stigid@rhel8: RHEL-08-020000
 
 ocil_clause: 'any temporary or emergency accounts have no expiration date set or do not expire within a documented time frame'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_maximum_age_login_defs/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_maximum_age_login_defs/rule.yml
index d8ccd9e086..15ccf530c6 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_maximum_age_login_defs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_maximum_age_login_defs/rule.yml
@@ -47,6 +47,7 @@ references:
     iso27001-2013: A.18.1.4,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     ism: 0418,1055,1402
+    stigid@rhel8: RHEL-08-020200
 
 ocil_clause: 'PASS_MAX_DAYS is not set equal to or greater than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_minimum_age_login_defs/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_minimum_age_login_defs/rule.yml
index 0b6f878378..36a611e3d2 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_minimum_age_login_defs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_minimum_age_login_defs/rule.yml
@@ -45,6 +45,7 @@ references:
     cis-csc: 1,12,15,16,5
     cis@rhel8: 5.5.1.2
     ism: 0418,1055,1402
+    stigid@rhel8: RHEL-08-020190
 
 ocil_clause: 'it is not equal to or greater than the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_minlen_login_defs/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_minlen_login_defs/rule.yml
index 909b51faa8..f9884fd9b4 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_minlen_login_defs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_minlen_login_defs/rule.yml
@@ -42,6 +42,7 @@ references:
     cis-csc: 1,12,15,16,5
     srg: SRG-OS-000078-GPOS-00046
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
+    stigid@rhel8: RHEL-08-020231
 
 ocil_clause: 'it is not set to the required value'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_max_life_existing/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_max_life_existing/rule.yml
index 6d91224cd9..0ef1fcfe8d 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_max_life_existing/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_max_life_existing/rule.yml
@@ -31,6 +31,7 @@ references:
     vmmsrg: SRG-OS-000076-VMM-000430
     stigid@rhel7: RHEL-07-010260
     stigid@sle12: SLES-12-010290
+    stigid@rhel8: RHEL-08-020210
 
 ocil_clause: 'existing passwords are not configured correctly'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_min_life_existing/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_min_life_existing/rule.yml
index 44da709702..cc073067fb 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_min_life_existing/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_expiration/accounts_password_set_min_life_existing/rule.yml
@@ -31,6 +31,7 @@ references:
     vmmsrg: SRG-OS-000075-VMM000420
     stigid@rhel7: RHEL-07-010240
     stigid@sle12: SLES-12-010260
+    stigid@rhel8: RHEL-08-020180
 
 ocil_clause: 'existing passwords are not configured correctly'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/password_storage/no_empty_passwords/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/password_storage/no_empty_passwords/rule.yml
index 0e36afc8dc..df6da6b913 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/password_storage/no_empty_passwords/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/password_storage/no_empty_passwords/rule.yml
@@ -45,6 +45,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.02,DSS06.03,DSS06.10
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.18.1.4,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5
+    stigid@rhel8:  sshd_disable_empty_passwords
 
 ocil_clause: 'NULL passwords can be used'
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/root_logins/accounts_no_uid_except_zero/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/root_logins/accounts_no_uid_except_zero/rule.yml
index 7fd291caea..6b3c71fa80 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/root_logins/accounts_no_uid_except_zero/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/root_logins/accounts_no_uid_except_zero/rule.yml
@@ -42,6 +42,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.02,DSS06.03,DSS06.10
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.18.1.4,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-040200
 
 ocil_clause: 'any account other than root has a UID of 0'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_have_homedir_login_defs/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_have_homedir_login_defs/rule.yml
index fdd7c6f603..9e19b908c4 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_have_homedir_login_defs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_have_homedir_login_defs/rule.yml
@@ -29,6 +29,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020610
     stigid@sle12: SLES-12-010720
+    stigid@rhel8: RHEL-08-010760
 
 ocil_clause: 'the value of CREATE_HOME is not set to yes, is missing, or the line is commented out'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
index 84b38afc2c..e62e3cc62b 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
@@ -30,6 +30,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
+    stigid@rhel8: RHEL-08-020310
 
 ocil_clause: 'the above command returns no output, or FAIL_DELAY is configured less than the expected value'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_max_concurrent_login_sessions/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_max_concurrent_login_sessions/rule.yml
index 32412aa482..5787380d65 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_max_concurrent_login_sessions/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_max_concurrent_login_sessions/rule.yml
@@ -37,6 +37,7 @@ references:
     cobit5: DSS01.05,DSS05.02
     iso27001-2013: A.13.1.1,A.13.1.3,A.13.2.1,A.14.1.2,A.14.1.3
     cis-csc: 14,15,18,9
+    stigid@rhel8: RHEL-08-020024
 
 ocil_clause: 'maxlogins is not equal to or less than the expected value'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
index 77f3a12148..b73743ebcb 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
@@ -28,6 +28,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020730
     stigid@sle12: SLES-12-010780
+    stigid@rhel8: RHEL-08-010660
 
 ocil_clause: 'files are executing world-writable programs'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
index 0154c1d73b..b70bfc171a 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
@@ -32,6 +32,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020720
     stigid@sle12: SLES-12-010770
+    stigid@rhel8: RHEL-08-010690
 
 ocil_clause: 'paths contain more than local home directories'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
index 9ee21744b2..a0e6277ec6 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
@@ -24,6 +24,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020600
     stigid@sle12: SLES-12-010710
+    stigid@rhel8: RHEL-08-010720
 
 ocil_clause: 'users home directory is not defined'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_exists/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_exists/rule.yml
index a262abba7a..1c8fb04df7 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_exists/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_exists/rule.yml
@@ -31,6 +31,7 @@ references:
     stigid@rhel7: RHEL-07-020620
     cis@rhel8: 6.2.20
     stigid@sle12: SLES-12-010730
+    stigid@rhel8: RHEL-08-010750
 
 ocil_clause: 'users home directory does not exist'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/file_groupownership_home_directories/rule.yml b/linux_os/guide/system/accounts/accounts-session/file_groupownership_home_directories/rule.yml
index dfcbbafd17..6c70cc8abf 100644
--- a/linux_os/guide/system/accounts/accounts-session/file_groupownership_home_directories/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/file_groupownership_home_directories/rule.yml
@@ -30,6 +30,7 @@ references:
     stigid@rhel7: RHEL-07-020650
     cis@rhel8: 6.2.8
     stigid@sle12: SLES-12-010750
+    stigid@rhel8: RHEL-08-010740
 
 ocil_clause: 'the group ownership is incorrect'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml b/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
index 4810c941d6..411a46dd00 100644
--- a/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
@@ -26,6 +26,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020710
     stigid@sle12: SLES-12-010760
+    stigid@rhel8: RHEL-08-010770
 
 ocil_clause: 'they are not 0740 or more permissive'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml b/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
index 4898bfa6b6..62d603cfbb 100644
--- a/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
@@ -26,6 +26,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-020630
     stigid@sle12: SLES-12-010740
+    stigid@rhel8: RHEL-08-010730
 
 ocil_clause: 'they are more permissive'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
index 8acc92b311..1c8219de70 100644
--- a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
@@ -32,6 +32,7 @@ references:
     iso27001-2013: A.14.1.1,A.14.2.1,A.14.2.5,A.6.1.5
     cis-csc: '18'
     srg: SRG-OS-000480-GPOS-00228
+    stigid@rhel8: RHEL-08-020353
 
 ocil_clause: 'the above command returns no output, or if the umask is configured incorrectly'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_login_defs/rule.yml b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_login_defs/rule.yml
index 0f4eb59188..0c86e6e9f7 100644
--- a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_login_defs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_login_defs/rule.yml
@@ -33,6 +33,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.1.1,A.14.2.1,A.14.2.2,A.14.2.3,A.14.2.4,A.14.2.5,A.6.1.5
     cis-csc: 11,18,3,9
     anssi: BP28(R35)
+    stigid@rhel8: RHEL-08-020351
 
 ocil_clause: 'the above command returns no output, or if the umask is configured incorrectly'
 
diff --git a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
index 6279928044..7629fcb3e4 100644
--- a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
@@ -24,6 +24,7 @@ references:
     disa: CCI-000366,CCI-001814
     srg: SRG-OS-000480-GPOS-00227
     stigid@rhel7: RHEL-07-021040
+    stigid@rhel8: RHEL-08-020352
 
 ocil_clause: 'the above command returns no output, or if the umask is configured incorrectly'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog/rule.yml
index 54e820c309..1d8a6f72cb 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog/rule.yml
@@ -50,6 +50,7 @@ references:
     cobit5: APO10.01,APO10.03,APO10.04,APO10.05,APO11.04,APO12.06,APO13.01,BAI03.05,BAI08.02,DSS01.03,DSS01.04,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS03.05,DSS05.02,DSS05.03,DSS05.04,DSS05.05,DSS05.07,MEA01.01,MEA01.02,MEA01.03,MEA01.04,MEA01.05,MEA02.01
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.7,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.2.1,A.6.2.2
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8,9
+    stigid@rhel8: RHEL-08-030600
 
 ocil_clause: 'there is not output'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable/rule.yml
index d264af9e2b..1f563ae0d0 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable/rule.yml
@@ -42,4 +42,5 @@ references:
     cobit5: APO01.06,APO10.01,APO10.03,APO10.04,APO10.05,APO11.04,APO12.06,BAI03.05,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,DSS06.02,MEA01.01,MEA01.02,MEA01.03,MEA01.04,MEA01.05,MEA02.01
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030121
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions/rule.yml
index f03069bae6..df14260d6d 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions/rule.yml
@@ -46,6 +46,7 @@ references:
     cobit5: APO10.01,APO10.03,APO10.04,APO10.05,APO11.04,APO12.06,APO13.01,BAI03.05,BAI08.02,DSS01.03,DSS01.04,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS03.05,DSS05.02,DSS05.03,DSS05.04,DSS05.05,DSS05.07,DSS06.03,MEA01.01,MEA01.02,MEA01.03,MEA01.04,MEA01.05,MEA02.01
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.7,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.6.2.1,A.6.2.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
+    stigid@rhel8: RHEL-08-030172
 
 ocil_clause: 'there is not output'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group/rule.yml
index e4b2b8dcb8..0af217801a 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group/rule.yml
@@ -53,6 +53,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.7,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.6.2.1,A.6.2.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
     stigid@sle12: SLES-12-020210
+    stigid@rhel8: RHEL-08-030170
 
 ocil_clause: 'the system is not configured to audit account changes'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow/rule.yml
index 0b5707f596..f4dce5557c 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow/rule.yml
@@ -53,6 +53,7 @@ references:
     cobit5: APO10.01,APO10.03,APO10.04,APO10.05,APO11.04,APO12.06,APO13.01,BAI03.05,BAI08.02,DSS01.03,DSS01.04,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS03.05,DSS05.02,DSS05.03,DSS05.04,DSS05.05,DSS05.07,DSS06.03,MEA01.01,MEA01.02,MEA01.03,MEA01.04,MEA01.05,MEA02.01
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.7,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.6.2.1,A.6.2.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
+    stigid@rhel8: RHEL-08-030160
 
 ocil_clause: 'the system is not configured to audit account changes'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd/rule.yml
index 41434f664a..240d4d8e2e 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd/rule.yml
@@ -54,6 +54,7 @@ references:
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
     srg@sle12: SRG-OS-000004-GPOS-00004,SRG-OS-000239-GPOS-00089,SRG-OS-000240-GPOS-00090,SRG-OS-000241-GPOS-00091,SRG-OS-000303-GPOS-00120,SRG-OS-000476-GPOS-00221
     stigid@sle12: SLES-12-020230
+    stigid@rhel8: RHEL-08-030140
 
 ocil_clause: 'the system is not configured to audit account changes'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd/rule.yml
index bae0a29903..069916da1b 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd/rule.yml
@@ -53,6 +53,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.7,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.6.2.1,A.6.2.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
     stigid@sle12: SLES-12-020200
+    stigid@rhel8: RHEL-08-030150
 
 ocil_clause: 'the system is not configured to audit account changes'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow/rule.yml
index f3d9cf9cd2..5c13ca58f6 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow/rule.yml
@@ -54,6 +54,7 @@ references:
     cis-csc: 1,11,12,13,14,15,16,18,19,2,3,4,5,6,7,8,9
     stigid@sle12: SLES-12-020220
     srg@sle12: SRG-OS-000004-GPOS-00004,SRG-OS-000239-GPOS-00089,SRG-OS-000240-GPOS-00090,SRG-OS-000241-GPOS-00091,SRG-OS-000303-GPOS-00120,SRG-OS-000476-GPOS-00221
+    stigid@rhel8: RHEL-08-030130
 
 ocil_clause: 'the system is not configured to audit account changes'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
index 671eb1ff9f..09618d986d 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
@@ -25,6 +25,7 @@ references:
     cobit5: APO01.06,APO11.04,APO12.06,BAI03.05,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,DSS06.02,MEA02.01
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030120
 
 ocil_clause: 'any are more permissive'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit/rule.yml
index 2bcfdca4b6..e495992ecb 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit/rule.yml
@@ -33,6 +33,7 @@ references:
     cobit5: APO01.06,APO11.04,APO12.06,BAI03.05,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,DSS06.02,MEA02.01
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030080
 
 ocil: |-
     {{{ describe_file_owner(file="/var/log/audit", owner="root") }}}
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit/rule.yml
index 2ec44f4041..eae8a2dfd0 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,APO11.04,APO12.06,BAI03.05,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,DSS06.02,MEA02.01
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030070
 
 ocil_clause: 'any are more permissive'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
index 5cd6c55411..442b693951 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
@@ -33,6 +33,7 @@ references:
     cobit5: APO11.04,APO12.06,APO13.01,BAI03.05,BAI04.04,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,MEA02.01
     iso27001-2013: A.12.1.3,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.16.1.4,A.16.1.5,A.16.1.7,A.17.2.1
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030040
 
 ocil_clause: 'the system is not configured to switch to single-user mode for corrective action'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
index f3b477da69..01a5c5201d 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
@@ -40,6 +40,7 @@ references:
     srg@sle12: SRG-OS-000047-GPOS-00023
     disa@sle12: CCI-000140
     nist@sle12: AU-5(b),AU-5.1(iv)
+    stigid@rhel8: RHEL-08-030060
 
 ocil_clause: 'the system is not configured to switch to single-user mode for corrective action'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct/rule.yml
index fd7b3ef1b3..8325306ac6 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct/rule.yml
@@ -43,6 +43,7 @@ references:
     srg@sle12: SRG-OS-000046-GPOS-00022
     disa@sle12: CCI-000139
     nist@sle12: AU-5(a),AU-5.1(ii)
+    stigid@rhel8: RHEL-08-030020
 
 ocil_clause: 'auditd is not configured to send emails per identified actions'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
index 9fa2ca6f46..6a32a85fe5 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
@@ -44,6 +44,7 @@ references:
     isa-62443-2009: 4.2.3.10,4.3.3.3.9,4.3.3.5.8,4.3.4.4.7,4.3.4.5.6,4.3.4.5.7,4.3.4.5.8,4.4.2.1,4.4.2.2,4.4.2.4
     cobit5: APO11.04,APO12.06,APO13.01,BAI03.05,BAI04.04,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030050
 
 ocil_clause: 'the system has not been properly configured to rotate audit logs'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
index 6b9d2e5f83..2f37c5b0e4 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
@@ -42,6 +42,7 @@ references:
     srg@sle12: SRG-OS-000343-GPOS-00134
     disa@sle12: CCI-001855
     nist@sle12: AU-5(1)
+    stigid@rhel8: RHEL-08-030730
 
 ocil_clause: 'the system is not configured a specfic size in MB to notify administrators of an issue'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
index bdc86cf35b..1009699e77 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
@@ -51,6 +51,8 @@ references:
     isa-62443-2009: 4.2.3.10,4.3.3.3.9,4.3.3.5.8,4.3.4.4.7,4.3.4.5.6,4.3.4.5.7,4.3.4.5.8,4.4.2.1,4.4.2.2,4.4.2.4
     cobit5: APO11.04,APO12.06,APO13.01,BAI03.05,BAI04.04,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
+    stigid@rhel8: RHEL-08-030730
+    stigid@rhel8: RHEL-08-030730
 
 ocil_clause: 'the system is not configured to send an email to the system administrator when disk space is starting to run low'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
index 8f20910163..5afb2c8f30 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_local_events/rule.yml
@@ -21,6 +21,7 @@ identifiers:
 references:
     ospp: FAU_GEN.1.1.c
     srg: SRG-OS-000062-GPOS-00031
+    stigid@rhel8: RHEL-08-030061
 
 ocil_clause: local_events isn't set to yes
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
index 250dff5e13..76d31a6ff5 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_log_format/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     ospp: FAU_GEN.1
     srg: SRG-OS-000255-GPOS-00096
+    stigid@rhel8: RHEL-08-030063
 
 ocil_clause: log_format isn't set to ENRICHED
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
index fb6a49708c..a778d5faf2 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_name_format/rule.yml
@@ -25,6 +25,7 @@ references:
     disa: CCI-001851
     ospp: FAU_GEN.1
     srg: SRG-OS-000039-GPOS-00017,SRG-OS-000342-GPOS-00133,SRG-OS-000479-GPOS-00224
+    stigid@rhel8: RHEL-08-030062
 
 ocil_clause: name_format isn't set to hostname
 
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
index 11020f93b3..d033770f57 100644
--- a/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
+++ b/linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
@@ -45,6 +45,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.2.1,A.14.1.3,A.15.2.1,A.15.2.2,A.16.1.4,A.16.1.5,A.16.1.7,A.6.2.1,A.6.2.2
     cis-csc: 1,11,12,13,14,15,16,19,3,4,5,6,7,8
     srg: SRG-OS-000254-GPOS-00095
+    stigid@rhel8: RHEL-08-030601
 
 ocil_clause: 'auditing is not enabled at boot time'
 
diff --git a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
index 750dd2001e..27e19e7c9a 100644
--- a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
+++ b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument/rule.yml
@@ -27,6 +27,7 @@ references:
     srg: SRG-OS-000254-GPOS-00095
     nist: CM-6(a)
     cis@rhel8: 4.1.1.4
+    stigid@rhel8: RHEL-08-030602
 
 ocil_clause: 'audit backlog limit is not configured'
 
diff --git a/linux_os/guide/system/auditing/package_audit_installed/rule.yml b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
index 2fc431c1ae..577176ff00 100644
--- a/linux_os/guide/system/auditing/package_audit_installed/rule.yml
+++ b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
@@ -26,6 +26,7 @@ references:
     srg@sle12: SRG-OS-000337-GPOS-00129,SRG-OS-000348-GPOS-00136,SRG-OS-000349-GPOS-00137,SRG-OS-000350-GPOS-00138,SRG-OS-000351-GPOS-00139,SRG-OS-000352-GPOS-00140,SRG-OS-000353-GPOS-00141,SRG-OS-000354-GPOS-00142,SRG-OS-000358-GPOS-00145,SRG-OS-000359-GPOS-00146,SRG-OS-000365-GPOS-00152,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220
     disa@sle12: CCI-000172,CCI-001814,CCI-001875,CCI-001877,CCI-001878,CCI-001879,CCI-001880,CCI-001881,CCI-001882,CCI-001889,CCI-001914
     nist@sle12: AU-7(a),AU-7(b),AU-8(b),AU-12.1(iv),AU-12(3),AU-12(c),CM-5(1)
+    stigid@rhel8:  service_auditd_enabled
 
 template:
     name: package_installed
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
index e9b85f815b..073f29c9fe 100644
--- a/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
+++ b/linux_os/guide/system/auditing/policy_rules/audit_immutable_login_uids/rule.yml
@@ -37,6 +37,7 @@ references:
     ospp: FAU_GEN.1.1.c
     nist: AU-2(a)
     srg: SRG-OS-000462-GPOS-00206,SRG-OS-000475-GPOS-00220
+    stigid@rhel8: RHEL-08-030122
 
 ocil_clause: 'the file does not exist or the content differs'
 
diff --git a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
index 0696ce915a..d09446bde8 100644
--- a/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
+++ b/linux_os/guide/system/auditing/service_auditd_enabled/rule.yml
@@ -52,6 +52,7 @@ references:
     srg@sle12: SRG-OS-000037-GPOS-00015,SRG-OS-000038-GPOS-00016,SRG-OS-000039-GPOS-00017,SRG-OS-000040-GPOS-00018,SRG-OS-000041-GPOS-00019,SRG-OS-000042-GPOS-00021,SRG-OS-000051-GPOS-00024,SRG-OS-000054-GPOS-00025,SRG-OS-000122-GPOS-00063,SRG-OS-000254-GPOS-00095,SRG-OS-000255-GPOS-00096,SRG-OS-000392-GPOS-00172,SRG-OS-000480-GPOS-00227
     disa@sle12: CCI-000130,CCI-000131,CCI-000132,CCI-000133,CCI-000134,CCI-000135,CCI-000154,CCI-000158,CCI-000366,CCI-001464,CCI-001487,CCI-001876,CCI-002884
     nist@sle12: AU-3,AU-3(1),AU-3(1).1(ii),AU-3.1,AU-6(4),AU-6(4).1,AU-7(1),AU-7(1).1,AU-7(a),AU-14(1),AU-14(1).1,CM-6(b),CM-6.1(iv),MA-4(1)(a)
+    stigid@rhel8: RHEL-08-010560
 
 ocil: '{{{ ocil_service_enabled(service="auditd") }}}'
 
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
index a77ebf9041..e3b63d960d 100644
--- a/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/grub2_pti_argument/rule.yml
@@ -25,6 +25,7 @@ identifiers:
 references:
     srg: SRG-OS-000433-GPOS-00193
     nist: SI-16
+    stigid@rhel8: RHEL-08-040004
 
 ocil_clause: 'Kernel page-table isolation is not enabled'
 
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
index ea0079db52..b090492046 100644
--- a/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/grub2_vsyscall_argument/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 references:
     srg: SRG-OS-000480-GPOS-00227
     nist: CM-7(a)
+    stigid@rhel8: RHEL-08-010422
 
 ocil_clause: 'vsyscalls are enabled'
 
diff --git a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
index 4b04936ee2..0690cfbcda 100644
--- a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
@@ -49,6 +49,7 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     anssi: BP28(R17)
+    stigid@rhel8: RHEL-08-010150
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_password/rule.yml b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_password/rule.yml
index b2338a5035..92129ab744 100644
--- a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_password/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_password/rule.yml
@@ -63,6 +63,7 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     anssi: BP28(R17)
+    stigid@rhel8: RHEL-08-010150
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
index ea5c80f163..08e1da4369 100644
--- a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
@@ -56,6 +56,7 @@ references:
     iso27001-2013: A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 11,12,14,15,16,18,3,5
     anssi: BP28(R17)
+    stigid@rhel8: RHEL-08-010140
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_password/rule.yml b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_password/rule.yml
index a423564c23..decb94b92e 100644
--- a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_password/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_password/rule.yml
@@ -67,6 +67,7 @@ references:
     iso27001-2013: A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 11,12,14,15,16,18,3,5
     anssi: BP28(R17)
+    stigid@rhel8: RHEL-08-010140
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/logging/ensure_rsyslog_log_file_configuration/rsyslog_cron_logging/rule.yml b/linux_os/guide/system/logging/ensure_rsyslog_log_file_configuration/rsyslog_cron_logging/rule.yml
index c1f14c4d7e..5e8f08fd5c 100644
--- a/linux_os/guide/system/logging/ensure_rsyslog_log_file_configuration/rsyslog_cron_logging/rule.yml
+++ b/linux_os/guide/system/logging/ensure_rsyslog_log_file_configuration/rsyslog_cron_logging/rule.yml
@@ -36,6 +36,7 @@ references:
     iso27001-2013: A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.15.2.1,A.15.2.2
     cis-csc: 1,14,15,16,3,5,6
     ism: 0988,1405
+    stigid@rhel8: RHEL-08-030010
 
 ocil_clause: 'cron is not logging to rsyslog'
 
diff --git a/linux_os/guide/system/logging/package_rsyslog-gnutls_installed/rule.yml b/linux_os/guide/system/logging/package_rsyslog-gnutls_installed/rule.yml
index aae3d94903..4e969a3079 100644
--- a/linux_os/guide/system/logging/package_rsyslog-gnutls_installed/rule.yml
+++ b/linux_os/guide/system/logging/package_rsyslog-gnutls_installed/rule.yml
@@ -18,6 +18,7 @@ identifiers:
 references:
     ospp: FTP_ITC_EXT.1.1
     srg: SRG-OS-000480-GPOS-00227,SRG-OS-000120-GPOS-00061
+    stigid@rhel8: RHEL-08-030680
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml b/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
index 3016a87700..7fb9ee408b 100644
--- a/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
+++ b/linux_os/guide/system/logging/package_rsyslog_installed/rule.yml
@@ -28,6 +28,7 @@ references:
     cobit5: APO11.04,BAI03.05,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,14,15,16,3,5,6
     srg: SRG-OS-000479-GPOS-00224,SRG-OS-000051-GPOS-00024
+    stigid@rhel8: RHEL-08-030670
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_loghost/rule.yml b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_loghost/rule.yml
index ba51a1506b..8d8be95f23 100644
--- a/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_loghost/rule.yml
+++ b/linux_os/guide/system/logging/rsyslog_sending_messages/rsyslog_remote_loghost/rule.yml
@@ -58,6 +58,7 @@ references:
     cobit5: APO11.04,APO13.01,BAI03.05,BAI04.04,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,13,14,15,16,2,3,5,6
     ism: 0988,1405
+    stigid@rhel8: RHEL-08-030690
 
 ocil_clause: 'none of these are present'
 
diff --git a/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml b/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
index 12ec48ad15..3ef70473de 100644
--- a/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
+++ b/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
@@ -29,6 +29,7 @@ references:
     cobit5: APO10.01,APO10.03,APO10.04,APO10.05,APO11.04,APO13.01,BAI03.05,BAI04.04,DSS01.03,DSS03.05,DSS05.02,DSS05.04,DSS05.05,DSS05.07,MEA01.01,MEA01.02,MEA01.03,MEA01.04,MEA01.05,MEA02.01
     cis-csc: 1,12,13,14,15,16,2,3,5,6,7,8,9
     cis@ubuntu2004: 4.2.1.2
+    stigid@rhel8: RHEL-08-010561
 
 ocil: '{{{ ocil_service_enabled(service="rsyslog") }}}'
 
diff --git a/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml b/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
index 7aea04c670..e82f50f9a0 100644
--- a/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
+++ b/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
@@ -20,6 +20,7 @@ references:
     nist: CM-6(a)
     srg: SRG-OS-000480-GPOS-00227,SRG-OS-000298-GPOS-00116
     cis@rhel8: 3.4.1.1
+    stigid@rhel8: RHEL-08-040100
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/network/network-firewalld/firewalld_activation/service_firewalld_enabled/rule.yml b/linux_os/guide/system/network/network-firewalld/firewalld_activation/service_firewalld_enabled/rule.yml
index 2646a5219c..818edc3cba 100644
--- a/linux_os/guide/system/network/network-firewalld/firewalld_activation/service_firewalld_enabled/rule.yml
+++ b/linux_os/guide/system/network/network-firewalld/firewalld_activation/service_firewalld_enabled/rule.yml
@@ -34,6 +34,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
     cis@sle15: 3.5.1.4
+    stigid@rhel8: RHEL-08-040100
 
 ocil: '{{{ ocil_service_enabled(service="firewalld") }}}'
 
diff --git a/linux_os/guide/system/network/network-firewalld/ruleset_modifications/configure_firewalld_ports/rule.yml b/linux_os/guide/system/network/network-firewalld/ruleset_modifications/configure_firewalld_ports/rule.yml
index 7d399274d5..04c7cebc2f 100644
--- a/linux_os/guide/system/network/network-firewalld/ruleset_modifications/configure_firewalld_ports/rule.yml
+++ b/linux_os/guide/system/network/network-firewalld/ruleset_modifications/configure_firewalld_ports/rule.yml
@@ -53,6 +53,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.9.1.2
     cis-csc: 11,12,14,15,3,8,9
     ism: "1416"
+    stigid@rhel8: RHEL-08-040030
 
 ocil_clause: 'the default rules are not configured'
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
index 47c811290c..8e7eabc336 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
@@ -27,6 +27,7 @@ references:
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
     cis@sle15: 3.3.9
+    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
index 5b5bfc9633..04fa55f524 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_defrtr", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
index d75989fca1..304c549b0b 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_pinfo", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
index 09d263cf00..d3b8347573 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_rtr_pref", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
index 9253f7235a..ae67ab248d 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
@@ -28,6 +28,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-040280
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
index 8767a5226f..ac9218fe34 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
@@ -40,6 +40,7 @@ references:
     cobit5: APO01.06,APO13.01,DSS01.05,DSS03.01,DSS05.02,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,4,6,8,9
+    stigid@rhel8: RHEL-08-040240
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_source_route", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
index d9b2acdec3..dcf480ef63 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
@@ -27,6 +27,7 @@ references:
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
     cis@sle15: 3.3.9
+    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
index 5cf98305c7..eca95f75b5 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_defrtr", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
index d7dad19f3a..f030cd9221 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_pinfo", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
index b6ee061057..43c901e3a4 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
@@ -16,6 +16,7 @@ identifiers:
 
 references:
     anssi: BP28(R22)
+    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_rtr_pref", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
index 970db38b33..fdd8572cf5 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
@@ -28,6 +28,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-040210
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_redirects/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_redirects/rule.yml
index 361073e99c..ffbc45225d 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_redirects/rule.yml
@@ -41,6 +41,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.9.1.2
     cis-csc: 1,11,12,13,14,15,16,2,3,7,8,9
     cis@sle15: 3.3.2
+    stigid@rhel8: RHEL-08-040280
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.all.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_source_route/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_source_route/rule.yml
index 7bc4e3b9b7..4bb38a2e5c 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_source_route/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_accept_source_route/rule.yml
@@ -41,6 +41,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,2,3,4,6,7,8,9
     cis@sle15: 3.3.1
+    stigid@rhel8: RHEL-08-040240
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.all.accept_source_route", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
index 8d22d12b28..3d1dfb6eb7 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_all_rp_filter/rule.yml
@@ -36,6 +36,7 @@ references:
     srg: SRG-OS-000480-GPOS-00227
     cis@sle15: 3.3.7
     stigid@rhel7: RHEL-07-040611
+    stigid@rhel8: RHEL-08-040285
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.all.rp_filter", value="1") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_redirects/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_redirects/rule.yml
index ed4a024797..4486a92e11 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_conf_default_accept_redirects/rule.yml
@@ -41,6 +41,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,2,3,4,6,7,8,9
     cis@sle15: 3.3.3
+    stigid@rhel8: RHEL-08-040210
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.default.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_icmp_echo_ignore_broadcasts/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_icmp_echo_ignore_broadcasts/rule.yml
index ef659ec1c2..f1c4947d34 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_icmp_echo_ignore_broadcasts/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_and_router_parameters/sysctl_net_ipv4_icmp_echo_ignore_broadcasts/rule.yml
@@ -38,6 +38,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,2,3,4,6,7,8,9
     cis@sle15: 3.3.5
+    stigid@rhel8: RHEL-08-040230
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.icmp_echo_ignore_broadcasts", value="1") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_all_send_redirects/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_all_send_redirects/rule.yml
index f49353c25c..779b92682d 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_all_send_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_all_send_redirects/rule.yml
@@ -39,6 +39,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,2,3,4,6,7,8,9
     cis@sle15: 3.2.2
+    stigid@rhel8: RHEL-08-040220
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.all.send_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_default_send_redirects/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_default_send_redirects/rule.yml
index d7d5bfe607..ade1338bae 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_default_send_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_conf_default_send_redirects/rule.yml
@@ -39,6 +39,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,2,3,4,6,7,8,9
     cis@sle15: 3.2.2
+    stigid@rhel8: RHEL-08-040270
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv4.conf.default.send_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
index b9f3d060d5..6274897a21 100644
--- a/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
+++ b/linux_os/guide/system/network/network-kernel/network_host_parameters/sysctl_net_ipv4_ip_forward/rule.yml
@@ -36,6 +36,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.1.3,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.17.2.1,A.9.1.2
     cis-csc: 1,11,12,13,14,15,16,2,3,7,8,9
     cis@sle15: 3.2.1
+    stigid@rhel8: RHEL-08-040260
 
 ocil: |-
     {{{ ocil_sysctl_option_value(sysctl="net.ipv4.ip_forward", value="0") }}}
diff --git a/linux_os/guide/system/network/network-uncommon/kernel_module_atm_disabled/rule.yml b/linux_os/guide/system/network/network-uncommon/kernel_module_atm_disabled/rule.yml
index d34f1610f1..caff3aaa00 100644
--- a/linux_os/guide/system/network/network-uncommon/kernel_module_atm_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-uncommon/kernel_module_atm_disabled/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040021
 
 {{{ complete_ocil_entry_module_disable(module="atm") }}}
 
diff --git a/linux_os/guide/system/network/network-uncommon/kernel_module_can_disabled/rule.yml b/linux_os/guide/system/network/network-uncommon/kernel_module_can_disabled/rule.yml
index 16807a4e81..f25e86ab4d 100644
--- a/linux_os/guide/system/network/network-uncommon/kernel_module_can_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-uncommon/kernel_module_can_disabled/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040022
 
 {{{ complete_ocil_entry_module_disable(module="can") }}}
 
diff --git a/linux_os/guide/system/network/network-uncommon/kernel_module_firewire-core_disabled/rule.yml b/linux_os/guide/system/network/network-uncommon/kernel_module_firewire-core_disabled/rule.yml
index aae80b232e..3c8564759c 100644
--- a/linux_os/guide/system/network/network-uncommon/kernel_module_firewire-core_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-uncommon/kernel_module_firewire-core_disabled/rule.yml
@@ -23,6 +23,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040026
 
 {{{ complete_ocil_entry_module_disable(module="firewire-core") }}}
 
diff --git a/linux_os/guide/system/network/network-uncommon/kernel_module_sctp_disabled/rule.yml b/linux_os/guide/system/network/network-uncommon/kernel_module_sctp_disabled/rule.yml
index 55602ac8be..8db0f11579 100644
--- a/linux_os/guide/system/network/network-uncommon/kernel_module_sctp_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-uncommon/kernel_module_sctp_disabled/rule.yml
@@ -34,6 +34,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040023
 
 {{{ complete_ocil_entry_module_disable(module="sctp") }}}
 
diff --git a/linux_os/guide/system/network/network-uncommon/kernel_module_tipc_disabled/rule.yml b/linux_os/guide/system/network/network-uncommon/kernel_module_tipc_disabled/rule.yml
index 425fa216e5..5953d5ca1d 100644
--- a/linux_os/guide/system/network/network-uncommon/kernel_module_tipc_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-uncommon/kernel_module_tipc_disabled/rule.yml
@@ -37,6 +37,7 @@ references:
     cis-csc: 11,14,3,9
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040024
 
 {{{ complete_ocil_entry_module_disable(module="tipc") }}}
 
diff --git a/linux_os/guide/system/network/network-wireless/wireless_software/kernel_module_bluetooth_disabled/rule.yml b/linux_os/guide/system/network/network-wireless/wireless_software/kernel_module_bluetooth_disabled/rule.yml
index 496480a0a8..a6c9b7ede4 100644
--- a/linux_os/guide/system/network/network-wireless/wireless_software/kernel_module_bluetooth_disabled/rule.yml
+++ b/linux_os/guide/system/network/network-wireless/wireless_software/kernel_module_bluetooth_disabled/rule.yml
@@ -35,6 +35,7 @@ references:
     iso27001-2013: A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.9.1.2
     cis-csc: 11,12,14,15,3,8,9
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040111
 
 {{{ complete_ocil_entry_module_disable(module="bluetooth") }}}
 
diff --git a/linux_os/guide/system/network/network-wireless/wireless_software/wireless_disable_interfaces/rule.yml b/linux_os/guide/system/network/network-wireless/wireless_software/wireless_disable_interfaces/rule.yml
index e76619cd2b..d683b2eda0 100644
--- a/linux_os/guide/system/network/network-wireless/wireless_software/wireless_disable_interfaces/rule.yml
+++ b/linux_os/guide/system/network/network-wireless/wireless_software/wireless_disable_interfaces/rule.yml
@@ -45,6 +45,7 @@ references:
     cis-csc: 11,12,14,15,3,8,9
     cis@sle15: 3.1.2
     ism: 1315,1319
+    stigid@rhel8: RHEL-08-040110
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/system/network/network_configure_name_resolution/rule.yml b/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
index 08049f76cb..a9c6550b47 100644
--- a/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
+++ b/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: APO13.01,DSS05.02
     iso27001-2013: A.13.1.1,A.13.2.1,A.14.1.3
     cis-csc: 12,15,8
+    stigid@rhel8: RHEL-08-010680
 
 ocil_clause: 'it does not exist or is not properly configured or less than 2 ''nameserver'' entries exist'
 
diff --git a/linux_os/guide/system/network/network_sniffer_disabled/rule.yml b/linux_os/guide/system/network/network_sniffer_disabled/rule.yml
index 208d15234e..222063ae09 100644
--- a/linux_os/guide/system/network/network_sniffer_disabled/rule.yml
+++ b/linux_os/guide/system/network/network_sniffer_disabled/rule.yml
@@ -42,6 +42,7 @@ references:
     cobit5: APO11.06,APO12.06,BAI03.10,BAI09.01,BAI09.02,BAI09.03,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS01.05,DSS04.05,DSS05.02,DSS05.05,DSS06.06
     iso27001-2013: A.11.1.2,A.11.2.4,A.11.2.5,A.11.2.6,A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.16.1.6,A.8.1.1,A.8.1.2,A.9.1.2
     cis-csc: 1,11,14,3,9
+    stigid@rhel8: RHEL-08-040330
 
 ocil_clause: 'any network device is in promiscuous mode'
 
diff --git a/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml b/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
index f479ed3d17..90011f5f92 100644
--- a/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
+++ b/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
@@ -24,6 +24,7 @@ identifiers:
 
 references:
     anssi: BP28(R40)
+    stigid@rhel8: RHEL-08-010700
 
 ocil_clause: 'there is output'
 
diff --git a/linux_os/guide/system/permissions/files/file_permissions_ungroupowned/rule.yml b/linux_os/guide/system/permissions/files/file_permissions_ungroupowned/rule.yml
index 79594c701f..a9efbdda1e 100644
--- a/linux_os/guide/system/permissions/files/file_permissions_ungroupowned/rule.yml
+++ b/linux_os/guide/system/permissions/files/file_permissions_ungroupowned/rule.yml
@@ -42,6 +42,7 @@ references:
     cis-csc: 1,11,12,13,14,15,16,18,3,5
     cis@sle15: 6.1.12
     stigid@sle12: SLES-12-010700
+    stigid@rhel8: RHEL-08-010790
 
 ocil_clause: 'there is output'
 
diff --git a/linux_os/guide/system/permissions/files/no_files_unowned_by_user/rule.yml b/linux_os/guide/system/permissions/files/no_files_unowned_by_user/rule.yml
index faab0b8822..6acae65b78 100644
--- a/linux_os/guide/system/permissions/files/no_files_unowned_by_user/rule.yml
+++ b/linux_os/guide/system/permissions/files/no_files_unowned_by_user/rule.yml
@@ -42,6 +42,7 @@ references:
     cis-csc: 11,12,13,14,15,16,18,3,5,9
     cis@sle15: 6.1.11
     stigid@sle12: SLES-12-010690
+    stigid@rhel8: RHEL-08-010780
 
 ocil_clause: 'files exist that are not owned by a valid user'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
index cfa7ae4dc5..fa53de9041 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-010310
 
 ocil_clause: 'any system executables are found to not be owned by root'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
index 53e1a24c42..e40b5f47d8 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
@@ -37,6 +37,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-010340
 
 ocil_clause: 'any of these files are not owned by root'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
index c2bba15f83..3ec56361dc 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-010300
 
 ocil_clause: 'any system executables are found to be group or world writable'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
index c09024a224..83add611b9 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
@@ -37,6 +37,7 @@ references:
     cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
+    stigid@rhel8: RHEL-08-010330
 
 ocil_clause: 'any of these files are group-writable or world-writable'
 
diff --git a/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml b/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
index 3b04abbf9b..0aefe8ae50 100644
--- a/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
+++ b/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
@@ -22,6 +22,7 @@ references:
     cis: 1.6.1
     nist: CM-6(a),AC-6(1)
     srg: SRG-OS-000324-GPOS-00125
+    stigid@rhel8: RHEL-08-010374
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="fs.protected_hardlinks", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml b/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
index aead2022ee..86a9f8e2d9 100644
--- a/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
+++ b/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
@@ -24,6 +24,7 @@ references:
     cis: 1.6.1
     nist: CM-6(a),AC-6(1)
     srg: SRG-OS-000324-GPOS-00125
+    stigid@rhel8: RHEL-08-010373
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="fs.protected_symlinks", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/mounting/kernel_module_cramfs_disabled/rule.yml b/linux_os/guide/system/permissions/mounting/kernel_module_cramfs_disabled/rule.yml
index d2ba212350..302154b636 100644
--- a/linux_os/guide/system/permissions/mounting/kernel_module_cramfs_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/mounting/kernel_module_cramfs_disabled/rule.yml
@@ -39,6 +39,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040025
 
 {{{ complete_ocil_entry_module_disable(module="cramfs") }}}
 
diff --git a/linux_os/guide/system/permissions/mounting/kernel_module_usb-storage_disabled/rule.yml b/linux_os/guide/system/permissions/mounting/kernel_module_usb-storage_disabled/rule.yml
index 24e77cc74e..d1d2bf97f7 100644
--- a/linux_os/guide/system/permissions/mounting/kernel_module_usb-storage_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/mounting/kernel_module_usb-storage_disabled/rule.yml
@@ -41,6 +41,7 @@ references:
     cis@rhel8: 1.1.23
     cis@sle15: 1.1.3
     stigid@sle12: SLES-12-010580
+    stigid@rhel8: RHEL-08-040080
 
 {{{ complete_ocil_entry_module_disable(module="usb-storage") }}}
 
diff --git a/linux_os/guide/system/permissions/mounting/service_autofs_disabled/rule.yml b/linux_os/guide/system/permissions/mounting/service_autofs_disabled/rule.yml
index 001b9466ae..00d1282a05 100644
--- a/linux_os/guide/system/permissions/mounting/service_autofs_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/mounting/service_autofs_disabled/rule.yml
@@ -46,6 +46,7 @@ references:
     iso27001-2013: A.11.2.6,A.13.1.1,A.13.2.1,A.18.1.4,A.6.2.1,A.6.2.2,A.7.1.1,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
     cis@sle15: 1.1.23
+    stigid@rhel8: RHEL-08-040070
 
 ocil: '{{{ ocil_service_disabled(service="autofs") }}}'
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_boot_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_boot_nosuid/rule.yml
index 8410964438..a4da22f666 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_boot_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_boot_nosuid/rule.yml
@@ -27,6 +27,7 @@ references:
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
     anssi: BP28(R12)
+    stigid@rhel8: RHEL-08-010571
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
index 140a2eafc0..318117fcca 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
@@ -36,6 +36,7 @@ references:
     cis-csc: 11,13,14,3,8,9
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.16
+    stigid@rhel8: RHEL-08-040120
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
index 2f740c31a6..f41387ab9f 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
@@ -39,6 +39,7 @@ references:
     cis-csc: 11,13,14,3,8,9
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.17
+    stigid@rhel8: RHEL-08-040122
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
index be127be367..d844c9c3b3 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
@@ -36,6 +36,7 @@ references:
     cis-csc: 11,13,14,3,8,9
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.18
+    stigid@rhel8: RHEL-08-040121
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_home_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_home_nosuid/rule.yml
index 3652cf9f2b..37e8f7fb99 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_home_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_home_nosuid/rule.yml
@@ -38,6 +38,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154,SRG-OS-000480-GPOS-00227
     stigid@sle12: SLES-12-010790
+    stigid@rhel8: RHEL-08-010570
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
index c9f52b36d1..f40daec6c8 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
@@ -42,5 +42,6 @@ references:
     cis-csc: 11,14,3,9
     srg: SRG-OS-000368-GPOS-00154
     anssi: BP28(R12)
+    stigid@rhel8: RHEL-08-010580
 
 platform: machine
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
index 30c7065bcc..602ce2da35 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
@@ -36,6 +36,7 @@ references:
     iso27001-2013: A.11.2.6,A.11.2.9,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.7.1.1,A.8.2.1,A.8.2.2,A.8.2.3,A.8.3.1,A.8.3.3,A.9.1.2,A.9.2.1
     cis-csc: 11,12,13,14,16,3,8,9
     cis@sle15: 1.1.19
+    stigid@rhel8: RHEL-08-010600
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
index 47435d887a..4d2bd0eceb 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
@@ -34,6 +34,7 @@ references:
     iso27001-2013: A.11.2.6,A.11.2.9,A.12.1.2,A.12.5.1,A.12.6.2,A.13.1.1,A.13.2.1,A.14.2.2,A.14.2.3,A.14.2.4,A.6.2.1,A.6.2.2,A.7.1.1,A.8.2.1,A.8.2.2,A.8.2.3,A.8.3.1,A.8.3.3,A.9.1.2,A.9.2.1
     cis-csc: 11,12,13,14,16,3,8,9
     cis@sle15: 1.1.20
+    stigid@rhel8: RHEL-08-010610
 
 ocil_clause: 'removable media partitions are present'
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_nosuid_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_nosuid_removable_partitions/rule.yml
index 5f19864ded..9ed257aa22 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_nosuid_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_nosuid_removable_partitions/rule.yml
@@ -41,6 +41,7 @@ references:
     cis-csc: 11,12,13,14,15,16,18,3,5,8,9
     cis@sle15: 1.1.21
     stigid@sle12: SLES-12-010800
+    stigid@rhel8: RHEL-08-010620
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
index bcd15e1596..ed27226855 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
@@ -35,6 +35,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.4
+    stigid@rhel8: RHEL-08-040123
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
index 7c8bf290fe..77ae8a664f 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
@@ -34,6 +34,7 @@ references:
     cis-csc: 11,13,14,3,8,9
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
+    stigid@rhel8: RHEL-08-040125
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
index 0f4a028834..b7e171fb02 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
@@ -35,6 +35,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.5
+    stigid@rhel8: RHEL-08-040124
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nodev/rule.yml
index c2765b6c61..404386d777 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nodev/rule.yml
@@ -28,6 +28,7 @@ references:
     nist: CM-7(a),CM-7(b),CM-6(a),AC-6,AC-6(1),MP-7
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
+    stigid@rhel8: RHEL-08-040129
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_noexec/rule.yml
index 820c8385b3..93c63a75f7 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_noexec/rule.yml
@@ -26,6 +26,7 @@ references:
     nist: CM-7(a),CM-7(b),CM-6(a),AC-6,AC-6(1),MP-7
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
+    stigid@rhel8: RHEL-08-040131
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nosuid/rule.yml
index 344bafd252..7ee7213995 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_audit_nosuid/rule.yml
@@ -27,6 +27,7 @@ references:
     nist: CM-7(a),CM-7(b),CM-6(a),AC-6,AC-6(1),MP-7
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
+    stigid@rhel8: RHEL-08-040130
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_nodev/rule.yml
index 4647f2e1c0..8959bd0bb5 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_nodev/rule.yml
@@ -28,6 +28,7 @@ references:
     nist: CM-7(a),CM-7(b),CM-6(a),AC-6,AC-6(1),MP-7
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
+    stigid@rhel8: RHEL-08-040126
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_noexec/rule.yml
index 0bced14721..baf1eea424 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_noexec/rule.yml
@@ -27,6 +27,7 @@ references:
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
     anssi: BP28(R12)
+    stigid@rhel8: RHEL-08-040128
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_log_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_log_nosuid/rule.yml
index c4e3d32997..beee543cf2 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_log_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_log_nosuid/rule.yml
@@ -28,6 +28,7 @@ references:
     nist-csf: PR.IP-1,PR.PT-2,PR.PT-3
     srg: SRG-OS-000368-GPOS-00154
     anssi: BP28(R12)
+    stigid@rhel8: RHEL-08-040127
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
index 233870fed8..4e76e61bb2 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
@@ -29,6 +29,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.9
+    stigid@rhel8: RHEL-08-040132
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
index 081b3a4b32..f2b108d58d 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
@@ -29,6 +29,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.11
+    stigid@rhel8: RHEL-08-040134
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
index 97a8312536..11bfe2661d 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
@@ -29,6 +29,7 @@ references:
     anssi: BP28(R12)
     srg: SRG-OS-000368-GPOS-00154
     cis@sle15: 1.1.10
+    stigid@rhel8: RHEL-08-040133
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
index 1bef2966d2..04b580e64e 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
@@ -30,6 +30,7 @@ references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000480-GPOS-00227
     cis@rhel8: 1.6.1
+    stigid@rhel8: RHEL-08-010675
 
 ocil_clause: ProcessSizeMax is not set to zero
 
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
index 953cd1598b..3225785a8f 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
@@ -26,6 +26,7 @@ references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000480-GPOS-00227
     cis@rhel8: 1.6.1
+    stigid@rhel8: RHEL-08-010674
 
 ocil_clause: Storage is not set to none
 
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
index 833fa046d6..c50a366512 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
@@ -30,6 +30,7 @@ references:
     iso27001-2013: A.12.1.3,A.17.2.1
     cis-csc: 1,12,13,15,16,2,7,8
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010673
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
index ff8cd4279f..fd12fbbb50 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
@@ -25,6 +25,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010672
 
 ocil_clause: unit systemd-coredump.socket is not masked or running
 
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
index c4b9a0dc88..c9794729dd 100644
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict/rule.yml
@@ -22,6 +22,7 @@ references:
     anssi: BP28(R23)
     nist: SC-30,SC-30(2),SC-30(5),CM-6(a)
     srg: SRG-OS-000132-GPOS-00067
+    stigid@rhel8: RHEL-08-040283
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.kptr_restrict", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/rule.yml b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/rule.yml
index d7d0736a94..950ae6b00b 100644
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_randomize_va_space/rule.yml
@@ -29,6 +29,7 @@ references:
     nist: SC-30,SC-30(2),CM-6(a)
     srg: SRG-OS-000433-GPOS-00193,SRG-OS-000480-GPOS-00227
     anssi: BP28(R23)
+    stigid@rhel8: RHEL-08-010430
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.randomize_va_space", value="2") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
index d5808b1861..48acc4d2fd 100644
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument/rule.yml
@@ -27,6 +27,7 @@ identifiers:
 references:
     srg: SRG-OS-000480-GPOS-00227
     nist: CM-6(a)
+    stigid@rhel8: RHEL-08-010421
 
 ocil_clause: 'page allocator poisoning is not enabled'
 
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
index 477fa57011..516409b6c6 100644
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument/rule.yml
@@ -27,6 +27,7 @@ identifiers:
 references:
     srg: SRG-OS-000433-GPOS-00192
     nist: CM-6(a)
+    stigid@rhel8: RHEL-08-010423
 
 ocil_clause: 'SLUB/SLAB poisoning is not enabled'
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
index eaed28cab1..b82e0fcce3 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
@@ -20,6 +20,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010671
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.core_pattern", value="|/bin/false") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_dmesg_restrict/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_dmesg_restrict/rule.yml
index eeec4f1723..90fcd34f73 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_dmesg_restrict/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_dmesg_restrict/rule.yml
@@ -24,6 +24,7 @@ references:
     nist: SI-11(a),SI-11(b)
     anssi: BP28(R23)
     srg: SRG-OS-000132-GPOS-00067
+    stigid@rhel8: RHEL-08-010375
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.dmesg_restrict", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled/rule.yml
index 7048a4baa7..83710b7c01 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010372
 
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.kexec_load_disabled", value="1") }}}
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_perf_event_paranoid/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_perf_event_paranoid/rule.yml
index da90c26f2f..c9fe044a06 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_perf_event_paranoid/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_perf_event_paranoid/rule.yml
@@ -20,6 +20,7 @@ references:
     anssi: BP28(R23)
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000132-GPOS-00067
+    stigid@rhel8: RHEL-08-010376
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.perf_event_paranoid", value="2") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled/rule.yml
index 883a2fc830..200c2eba46 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_unprivileged_bpf_disabled/rule.yml
@@ -20,6 +20,7 @@ identifiers:
 references:
     ospp: FMT_SMF_EXT.1
     srg: SRG-OS-000132-GPOS-00067
+    stigid@rhel8: RHEL-08-040281
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.unprivileged_bpf_disabled", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope/rule.yml
index 5332a2552d..68483432a3 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 references:
     anssi: BP28(R25)
     srg: SRG-OS-000132-GPOS-00067
+    stigid@rhel8: RHEL-08-040282
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.yama.ptrace_scope", value="1") }}}
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_user_max_user_namespaces/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_user_max_user_namespaces/rule.yml
index e89e70d2e4..5e3929ec1a 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_user_max_user_namespaces/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_user_max_user_namespaces/rule.yml
@@ -29,6 +29,7 @@ references:
     ospp: FMT_SMF_EXT.1
     nist: SC-39,CM-6(a)
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-040284
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="user.max_user_namespaces", value="0") }}}
 
diff --git a/linux_os/guide/system/selinux/package_policycoreutils_installed/rule.yml b/linux_os/guide/system/selinux/package_policycoreutils_installed/rule.yml
index df9053bb9f..a107af62ea 100644
--- a/linux_os/guide/system/selinux/package_policycoreutils_installed/rule.yml
+++ b/linux_os/guide/system/selinux/package_policycoreutils_installed/rule.yml
@@ -30,6 +30,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000480-GPOS-00227
+    stigid@rhel8: RHEL-08-010171
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/selinux/selinux_policytype/rule.yml b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
index ba2b9dc94f..f7d6ce6bf1 100644
--- a/linux_os/guide/system/selinux/selinux_policytype/rule.yml
+++ b/linux_os/guide/system/selinux/selinux_policytype/rule.yml
@@ -49,6 +49,7 @@ references:
     cobit5: APO01.06,APO11.04,APO13.01,BAI03.05,DSS01.05,DSS03.01,DSS05.02,DSS05.04,DSS05.05,DSS05.07,DSS06.02,DSS06.03,DSS06.06,MEA02.01
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.1,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,3,4,5,6,8,9
+    stigid@rhel8: RHEL-08-010450
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/selinux/selinux_state/rule.yml b/linux_os/guide/system/selinux/selinux_state/rule.yml
index 65cb503d39..0c4056dfe0 100644
--- a/linux_os/guide/system/selinux/selinux_state/rule.yml
+++ b/linux_os/guide/system/selinux/selinux_state/rule.yml
@@ -40,6 +40,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.1,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,3,4,5,6,8,9
     anssi: BP28(R4),BP28(R66)
+    stigid@rhel8: RHEL-08-010170
 
 ocil_clause: 'SELINUX is not set to enforcing'
 
diff --git a/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml b/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
index fe370a4323..8d5b722c07 100644
--- a/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml
@@ -64,6 +64,7 @@ references:
     cobit5: APO01.06,BAI02.01,BAI06.01,DSS04.07,DSS05.03,DSS05.04,DSS05.07,DSS06.02,DSS06.06
     cis-csc: 13,14
     stigid@sle12: SLES-12-010450
+    stigid@rhel8: RHEL-08-010030
 
 ocil_clause: 'partitions do not have a type of crypto_LUKS'
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_home/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_home/rule.yml
index 0c3cc8908e..061eeae93c 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_home/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_home/rule.yml
@@ -37,6 +37,7 @@ references:
     iso27001-2013: A.13.1.1,A.13.2.1,A.14.1.3
     cis-csc: 12,15,8
     cis@sle15: 1.1.14
+    stigid@rhel8: RHEL-08-010800
 
 {{{ complete_ocil_entry_separate_partition(part="/home") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_tmp/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_tmp/rule.yml
index 9fc2d4251a..a4db4948c6 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_tmp/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_tmp/rule.yml
@@ -34,6 +34,7 @@ references:
     iso27001-2013: A.13.1.1,A.13.2.1,A.14.1.3
     cis-csc: 12,15,8
     cis@sle15: 1.1.2
+    stigid@rhel8: RHEL-08-010543
 
 {{{ complete_ocil_entry_separate_partition(part="/tmp") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var/rule.yml
index 4ef85ef818..8190a4a4ca 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var/rule.yml
@@ -37,6 +37,7 @@ references:
     iso27001-2013: A.13.1.1,A.13.2.1,A.14.1.3
     cis-csc: 12,15,8
     cis@sle15: 1.1.7
+    stigid@rhel8: RHEL-08-010540
 
 {{{ complete_ocil_entry_separate_partition(part="/var") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
index fa0c4ab95d..b90f93deee 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
@@ -33,6 +33,8 @@ references:
     cis-csc: 1,12,14,15,16,3,5,6,8
     srg: SRG-OS-000480-GPOS-00227
     cis@sle: 1.1.12
+    stigid@rhel8: RHEL-08-010540
+    stigid@rhel8: RHEL-08-010541
 
 {{{ complete_ocil_entry_separate_partition(part="/var/log") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
index e1bc3ad113..73b5cd50ed 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
@@ -40,6 +40,9 @@ references:
     cobit5: APO11.04,APO13.01,BAI03.05,BAI04.04,DSS05.02,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,12,13,14,15,16,2,3,5,6,8
     cis@sle15: 1.1.13
+    stigid@rhel8: RHEL-08-010540
+    stigid@rhel8: RHEL-08-010541
+    stigid@rhel8: RHEL-08-010542
 
 {{{ complete_ocil_entry_separate_partition(part="/var/log/audit") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
index 340af24c82..fde3338f40 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
@@ -26,6 +26,7 @@ references:
     cis@ubuntu1804: 1.1.6
     anssi: BP28(R12)
     cis@sle15: 1.1.8
+    stigid@rhel8: RHEL-08-010540
 
 {{{ complete_ocil_entry_separate_partition(part="/var/tmp") }}}
 
diff --git a/linux_os/guide/system/software/gnome/gnome_login_screen/gnome_gdm_disable_automatic_login/rule.yml b/linux_os/guide/system/software/gnome/gnome_login_screen/gnome_gdm_disable_automatic_login/rule.yml
index 85423650fa..0594702aa4 100644
--- a/linux_os/guide/system/software/gnome/gnome_login_screen/gnome_gdm_disable_automatic_login/rule.yml
+++ b/linux_os/guide/system/software/gnome/gnome_login_screen/gnome_gdm_disable_automatic_login/rule.yml
@@ -39,6 +39,7 @@ references:
     cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
+    stigid@rhel8: RHEL-08-010820
 
 ocil_clause: 'GDM allows users to automatically login'
 
diff --git a/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_idle_delay/rule.yml b/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_idle_delay/rule.yml
index bec17bc68b..cd33cd5b62 100644
--- a/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_idle_delay/rule.yml
+++ b/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_idle_delay/rule.yml
@@ -48,6 +48,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-020060
 
 ocil_clause: 'idle-delay is not equal to or less than the expected value'
 
diff --git a/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_lock_enabled/rule.yml b/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_lock_enabled/rule.yml
index b27b34dcf7..aa492e1c9c 100644
--- a/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_lock_enabled/rule.yml
+++ b/linux_os/guide/system/software/gnome/gnome_screen_locking/dconf_gnome_screensaver_lock_enabled/rule.yml
@@ -43,6 +43,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
+    stigid@rhel8: RHEL-08-020030
 
 ocil_clause: 'screensaver locking is not enabled and/or has not been set or configured correctly'
 
diff --git a/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml b/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
index 31712897eb..fae18baff6 100644
--- a/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
+++ b/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
@@ -44,6 +44,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@rhel7: RHEL-07-020231
+    stigid@rhel8: RHEL-08-040171
 
 ocil_clause: 'GNOME3 is configured to reboot when Ctrl-Alt-Del is pressed'
 
diff --git a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
index fba676f0b9..d9eb1b8a61 100644
--- a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
+++ b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
@@ -48,6 +48,7 @@ references:
     cobit5: APO12.01,APO12.02,APO12.03,APO12.04,BAI03.10,DSS05.01,DSS05.02
     iso27001-2013: A.12.6.1,A.14.2.3,A.16.1.3,A.18.2.2,A.18.2.3
     cis-csc: 18,20,4
+    stigid@rhel8: RHEL-08-010000
 
 ocil_clause: 'the installed operating system is not supported'
 
diff --git a/linux_os/guide/system/software/integrity/crypto/ssh_client_rekey_limit/rule.yml b/linux_os/guide/system/software/integrity/crypto/ssh_client_rekey_limit/rule.yml
index e911216101..e054892daf 100644
--- a/linux_os/guide/system/software/integrity/crypto/ssh_client_rekey_limit/rule.yml
+++ b/linux_os/guide/system/software/integrity/crypto/ssh_client_rekey_limit/rule.yml
@@ -31,6 +31,7 @@ identifiers:
 references:
     ospp: FCS_SSHS_EXT.1
     srg: SRG-OS-000423-GPOS-00187
+    stigid@rhel8: RHEL-08-040162
 
 ocil_clause: 'it is commented out or is not set'
 
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
index 565dabb4b9..558dfc89dd 100644
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/rule.yml
@@ -39,6 +39,7 @@ references:
     ospp: FCS_COP.1(1),FCS_COP.1(2),FCS_COP.1(3),FCS_COP.1(4),FCS_CKM.1,FCS_CKM.2,FCS_TLSC_EXT.1
     srg: SRG-OS-000478-GPOS-00223,SRG-OS-000396-GPOS-00176
     ism: "1446"
+    stigid@rhel8: RHEL-08-010020
 
 ocil_clause: 'FIPS mode is not enabled'
 
diff --git a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
index 77c78d5705..5879bc2bdb 100644
--- a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
@@ -47,6 +47,7 @@ references:
     cobit5: APO13.01,DSS01.04,DSS05.02,DSS05.03
     iso27001-2013: A.11.2.6,A.13.1.1,A.13.2.1,A.14.1.3,A.6.2.1,A.6.2.2
     cis-csc: 12,15,8
+    stigid@rhel8: RHEL-08-010020
 
 ocil_clause: 'FIPS is not configured or enabled in grub'
 
diff --git a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
index 59af9a96e7..0807f512fb 100644
--- a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
@@ -28,6 +28,7 @@ references:
     disa: CCI-000068,CCI-000803,CCI-002450
     nist: SC-12(2),SC-12(3),IA-7,SC-13,CM-6(a),SC-12
     vmmsrg: SRG-OS-000120-VMM-000600,SRG-OS-000478-VMM-001980,SRG-OS-000396-VMM-001590
+    stigid@rhel8: RHEL-08-010020
 
 ocil_clause: 'crypto.fips_enabled is not 1'
 
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
index cc696141f6..80a0bce1cc 100644
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
@@ -50,6 +50,7 @@ references:
     stigid@sle12: SLES-12-010510
     srg@sle12: SRG-OS-000447-GPOS-00201
     disa@sle12:  CCI-002702 
+    stigid@rhel8: RHEL-08-010360
 
 ocil_clause: 'AIDE has not been configured or has not been configured to notify personnel of scan details'
 
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_acls/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_acls/rule.yml
index 93bdb1715d..451ad97613 100644
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_acls/rule.yml
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_acls/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,BAI03.05,BAI06.01,DSS06.02
     iso27001-2013: A.11.2.4,A.12.2.1,A.12.5.1,A.14.1.2,A.14.1.3,A.14.2.4
     cis-csc: 2,3
+    stigid@rhel8: RHEL-08-040310
 
 ocil_clause: 'the acl option is missing or not added to the correct ruleset'
 
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
index 2e81a270c5..3be8209a71 100644
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
@@ -36,6 +36,7 @@ references:
     cobit5: APO01.06,BAI03.05,BAI06.01,DSS06.02
     iso27001-2013: A.11.2.4,A.12.2.1,A.12.5.1,A.14.1.2,A.14.1.3,A.14.2.4
     cis-csc: 2,3
+    stigid@rhel8: RHEL-08-040300
 
 ocil_clause: 'the xattrs option is missing or not added to the correct ruleset'
 
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
index abf13a274a..1667604386 100644
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
@@ -33,6 +33,7 @@ references:
     ism: 1034,1288,1341,1417
     stigid@sle12: SLES-12-010500
     disa@sle12: CCI-002699
+    stigid@rhel8: RHEL-08-010360
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/software/sap_host/accounts_authorized_local_users/rule.yml b/linux_os/guide/system/software/sap_host/accounts_authorized_local_users/rule.yml
index 435630d85c..51b839b55a 100644
--- a/linux_os/guide/system/software/sap_host/accounts_authorized_local_users/rule.yml
+++ b/linux_os/guide/system/software/sap_host/accounts_authorized_local_users/rule.yml
@@ -25,6 +25,9 @@ rationale: |-
 
 severity: medium
 
+references:
+    stigid@rhel8: RHEL-08-020320
+
 ocil_clause: 'there are unauthorized local user accounts on the system'
 
 ocil: |-
diff --git a/linux_os/guide/system/software/sudo/sudo_remove_no_authenticate/rule.yml b/linux_os/guide/system/software/sudo/sudo_remove_no_authenticate/rule.yml
index e704df8983..d01fa44615 100644
--- a/linux_os/guide/system/software/sudo/sudo_remove_no_authenticate/rule.yml
+++ b/linux_os/guide/system/software/sudo/sudo_remove_no_authenticate/rule.yml
@@ -37,6 +37,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-010381
 
 ocil_clause: "!authenticate is enabled in sudo"
 
diff --git a/linux_os/guide/system/software/sudo/sudo_remove_nopasswd/rule.yml b/linux_os/guide/system/software/sudo/sudo_remove_nopasswd/rule.yml
index 8aee5edfa3..382c4b8851 100644
--- a/linux_os/guide/system/software/sudo/sudo_remove_nopasswd/rule.yml
+++ b/linux_os/guide/system/software/sudo/sudo_remove_nopasswd/rule.yml
@@ -38,6 +38,7 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16,5
+    stigid@rhel8: RHEL-08-010380
 
 ocil_clause: 'nopasswd is enabled in sudo'
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
index ed2fc64d08..5482cdf3af 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-ccpp") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
index 8bbf9ea53d..3b12bfb5b0 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-kerneloops") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
index 9be8b08b0f..00b1a36714 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-python") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
index 9aa7f11ada..0412e8b82b 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-cli") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
index d970def693..9d10076523 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-logger") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
index 7f7787a19a..addb652e92 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-rhtsupport") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
index 6107659d94..6647186cc7 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
@@ -18,6 +18,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-sosreport") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_gssproxy_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_gssproxy_removed/rule.yml
index 3fea028d70..fa94959f68 100644
--- a/linux_os/guide/system/software/system-tools/package_gssproxy_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_gssproxy_removed/rule.yml
@@ -18,7 +18,8 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    
+    stigid@rhel8: RHEL-08-040370
+
 {{{ complete_ocil_entry_package(package="gssproxy") }}}
 
 template:
diff --git a/linux_os/guide/system/software/system-tools/package_iprutils_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_iprutils_removed/rule.yml
index 2c0bdee8a6..9ec5c88c50 100644
--- a/linux_os/guide/system/software/system-tools/package_iprutils_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_iprutils_removed/rule.yml
@@ -19,6 +19,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040380
 
 {{{ complete_ocil_entry_package(package="iprutils") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
index b7e1b4adff..9753c2c773 100644
--- a/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_krb5-workstation_removed/rule.yml
@@ -22,6 +22,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049,SRG-OS-000120-GPOS-00061
+    stigid@rhel8: RHEL-08-010162
 
 {{{ complete_ocil_entry_package(package="krb5-workstation") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_tuned_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_tuned_removed/rule.yml
index 65c7a22e3e..f12bbc2093 100644
--- a/linux_os/guide/system/software/system-tools/package_tuned_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_tuned_removed/rule.yml
@@ -21,6 +21,7 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
+    stigid@rhel8: RHEL-08-040390
 
 {{{ complete_ocil_entry_package(package="tuned") }}}
 
diff --git a/linux_os/guide/system/software/updating/clean_components_post_updating/rule.yml b/linux_os/guide/system/software/updating/clean_components_post_updating/rule.yml
index f9defcfdc1..6239e950a1 100644
--- a/linux_os/guide/system/software/updating/clean_components_post_updating/rule.yml
+++ b/linux_os/guide/system/software/updating/clean_components_post_updating/rule.yml
@@ -33,6 +33,7 @@ references:
     cobit5: APO12.01,APO12.02,APO12.03,APO12.04,BAI03.10,DSS05.01,DSS05.02
     iso27001-2013: A.12.6.1,A.14.2.3,A.16.1.3,A.18.2.2,A.18.2.3
     cis-csc: 18,20,4
+    stigid@rhel8: RHEL-08-010440
 
 ocil_clause: 'clean_requirements_on_remove is not enabled or configured correctly'
 
diff --git a/linux_os/guide/system/software/updating/ensure_gpgcheck_globally_activated/rule.yml b/linux_os/guide/system/software/updating/ensure_gpgcheck_globally_activated/rule.yml
index 1f86aff1e9..7d031c93f1 100644
--- a/linux_os/guide/system/software/updating/ensure_gpgcheck_globally_activated/rule.yml
+++ b/linux_os/guide/system/software/updating/ensure_gpgcheck_globally_activated/rule.yml
@@ -56,6 +56,7 @@ references:
     cis-csc: 11,2,3,9
     anssi: BP28(R15)
     stigid@sle12: SLES-12-010550
+    stigid@rhel8: RHEL-08-010370
 
 ocil_clause: 'GPG checking is not enabled'
 
diff --git a/linux_os/guide/system/software/updating/ensure_gpgcheck_local_packages/rule.yml b/linux_os/guide/system/software/updating/ensure_gpgcheck_local_packages/rule.yml
index 440f02b2a7..54a584cc9d 100644
--- a/linux_os/guide/system/software/updating/ensure_gpgcheck_local_packages/rule.yml
+++ b/linux_os/guide/system/software/updating/ensure_gpgcheck_local_packages/rule.yml
@@ -40,6 +40,7 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
     anssi: BP28(R15)
+    stigid@rhel8: RHEL-08-010371
 
 ocil_clause: 'gpgcheck is not enabled or configured correctly to verify local packages'
 
diff --git a/linux_os/guide/system/software/updating/security_patches_up_to_date/rule.yml b/linux_os/guide/system/software/updating/security_patches_up_to_date/rule.yml
index 25459f4abb..32f67fe0e3 100644
--- a/linux_os/guide/system/software/updating/security_patches_up_to_date/rule.yml
+++ b/linux_os/guide/system/software/updating/security_patches_up_to_date/rule.yml
@@ -59,6 +59,7 @@ references:
     iso27001-2013: A.12.6.1,A.14.2.3,A.16.1.3,A.18.2.2,A.18.2.3
     cis-csc: 18,20,4
     anssi: BP28(R08)
+    stigid@rhel8: RHEL-08-010010
 
 
 # SCAP 1.3 content should reference flat non compressed xml files
diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index cda0239433..03ce772734 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -1,13 +1,13 @@
 documentation_complete: true
 
 metadata:
-    version: V1R0.1-Draft
+    version: V1R1
     SMEs:
         - carlosmmatos
 
 reference: https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
 
-title: '[DRAFT] DISA STIG for Red Hat Enterprise Linux 8'
+title: 'DISA STIG for Red Hat Enterprise Linux 8'
 
 description: |-
     This profile contains configuration checks that align to the
@@ -23,46 +23,286 @@ description: |-
     - Red Hat Storage
     - Red Hat Containers with a Red Hat Enterprise Linux 8 image
 
-extends: ospp
-
 selections:
-    - login_banner_text=dod_banners
-    - dconf_db_up_to_date
+    - var_rekey_limit_size=1G
+    - var_rekey_limit_time=1hour
+    - var_accounts_user_umask=077
+    - var_password_pam_difok=4
+    - var_password_pam_maxrepeat=3
+    - var_password_pam_maxclassrepeat=4
+    - var_accounts_max_concurrent_login_sessions=10
+    - var_password_pam_unix_remember=5
+    - var_selinux_state=enforcing
+    - var_selinux_policy_name=targeted
+    - var_system_crypto_policy=fips_ospp
+    - var_accounts_password_minlen_login_defs=15
+    - var_password_pam_minlen=15
+    - var_password_pam_ocredit=1
+    - var_password_pam_dcredit=1
+    - var_password_pam_ucredit=1
+    - var_password_pam_lcredit=1
+    - sshd_idle_timeout_value=10_minutes
+    - var_accounts_passwords_pam_faillock_deny=3
+    - var_accounts_passwords_pam_faillock_fail_interval=900
+    - var_accounts_passwords_pam_faillock_unlock_time=never
+    - var_ssh_client_rekey_limit_size=1G
+    - var_ssh_client_rekey_limit_time=1hour
+    - var_accounts_fail_delay=4
+
+
+    - installed_OS_is_vendor_supported
+    - security_patches_up_to_date
+    - enable_fips_mode
+    - sysctl_crypto_fips_enabled
+    - encrypt_partitions
+    - sshd_enable_warning_banner
     - dconf_gnome_banner_enabled
     - dconf_gnome_login_banner_text
     - banner_etc_issue
+    - set_password_hashing_algorithm_logindefs
+    - grub2_uefi_password
+    - grub2_uefi_admin_username
+    - grub2_password
+    - grub2_admin_username
+    - kerberos_disable_no_keytab
+    - package_krb5-workstation_removed
+    - selinux_state
+    - package_policycoreutils_installed
+    - sshd_set_idle_timeout
+    - sshd_set_keepalive
+    - sshd_use_strong_rng
+    - file_permissions_binary_dirs
+    - file_ownership_binary_dirs
+    - file_permissions_library_dirs
+    - file_ownership_library_dirs
+    - ensure_gpgcheck_globally_activated
+    - ensure_gpgcheck_local_packages
+    - sysctl_kernel_kexec_load_disabled
+    - sysctl_fs_protected_symlinks
+    - sysctl_fs_protected_hardlinks
+    - sysctl_kernel_dmesg_restrict
+    - sysctl_kernel_perf_event_paranoid
+    - sudo_remove_nopasswd
+    - sudo_remove_no_authenticate
+    - package_opensc_installed
+    - grub2_page_poison_argument
+    - grub2_vsyscall_argument
+    - grub2_slub_debug_argument
+    - sysctl_kernel_randomize_va_space
+    - clean_components_post_updating
+    - selinux_policytype
+    - no_host_based_files
+    - no_user_host_based_files
+    - service_rngd_enabled
+    - file_permissions_sshd_pub_key
+    - file_permissions_sshd_private_key
+    - sshd_enable_strictmodes
+    - sshd_disable_compression
+    - sshd_disable_user_known_hosts
+    - partition_for_var
+    - partition_for_var_log
+    - partition_for_var_log_audit
+    - partition_for_tmp
+    - sshd_disable_root_login
+    - service_auditd_enabled
+    - service_rsyslog_enabled
+    - mount_option_home_nosuid
+    - mount_option_boot_nosuid
+    - mount_option_nodev_nonroot_local_partitions
+    - mount_option_nodev_removable_partitions
+    - mount_option_noexec_removable_partitions
+    - mount_option_nosuid_removable_partitions
+    - mount_option_noexec_remote_filesystems
+    - mount_option_nodev_remote_filesystems
+    - mount_option_nosuid_remote_filesystems
+    - service_kdump_disabled
+    - sysctl_kernel_core_pattern
+    - service_systemd-coredump_disabled
+    - disable_users_coredumps
+    - coredump_disable_storage
+    - coredump_disable_backtraces
+    - accounts_user_home_paths_only
+    - accounts_user_interactive_home_directory_defined
+    - file_permissions_home_directories
+    - file_groupownership_home_directories
+    - accounts_user_interactive_home_directory_exists
+    - accounts_have_homedir_login_defs
+    - file_permission_user_init_files
+    - no_files_unowned_by_user
+    - file_permissions_ungroupowned
+    - partition_for_home
+    - gnome_gdm_disable_automatic_login
+    - sshd_do_not_permit_user_env
+    - account_temp_expire_date
+    - accounts_passwords_pam_faillock_deny
+    - accounts_passwords_pam_faillock_interval
+    - accounts_passwords_pam_faillock_unlock_time
+    - accounts_passwords_pam_faillock_deny_root
+    - accounts_max_concurrent_login_sessions
+    - dconf_gnome_screensaver_lock_enabled
+    - configure_bashrc_exec_tmux
+    - no_tmux_in_shells
+    - dconf_gnome_screensaver_idle_delay
+    - configure_tmux_lock_after_time
+    - accounts_password_pam_ucredit
+    - accounts_password_pam_lcredit
+    - accounts_password_pam_dcredit
+    - accounts_password_pam_maxclassrepeat
+    - accounts_password_pam_maxrepeat
+    - accounts_password_pam_minclass
+    - accounts_password_pam_difok
     - accounts_password_set_min_life_existing
+    - accounts_minimum_age_login_defs
+    - accounts_maximum_age_login_defs
     - accounts_password_set_max_life_existing
+    - accounts_password_pam_unix_remember
+    - accounts_password_pam_minlen
+    - accounts_password_minlen_login_defs
     - account_disable_post_pw_expiration
-    - account_temp_expire_date
-    - audit_rules_usergroup_modification_passwd
-    - sssd_enable_smartcards
+    - accounts_password_pam_ocredit
     - sssd_offline_cred_expiration
-    - smartcard_configure_cert_checking
-    - encrypt_partitions
-    - sysctl_net_ipv4_tcp_syncookies
-    - clean_components_post_updating
-    - package_audispd-plugins_installed
-    - package_libcap-ng-utils_installed
-    - auditd_audispd_syslog_plugin_activated
-    - accounts_password_pam_enforce_local
-    - accounts_password_pam_enforce_root
-
-    # Configure TLS for remote logging
+    - accounts_logon_fail_delay
+    - display_login_attempts
+    - sshd_print_last_log
+    - accounts_umask_etc_login_defs
+    - accounts_umask_interactive_users
+    - accounts_umask_etc_bashrc
+    - rsyslog_cron_logging
+    - auditd_data_retention_action_mail_acct
+    - postfix_client_configure_mail_alias
+    - auditd_data_disk_error_action
+    - auditd_data_retention_max_log_file_action
+    - auditd_data_disk_full_action
+    - auditd_local_events
+    - auditd_name_format
+    - auditd_log_format
+    - file_permissions_var_log_audit
+    - directory_permissions_var_log_audit
+    - audit_rules_immutable
+    - audit_immutable_login_uids
+    - audit_rules_usergroup_modification_shadow
+    - audit_rules_usergroup_modification_opasswd
+    - audit_rules_usergroup_modification_passwd
+    - audit_rules_usergroup_modification_gshadow
+    - audit_rules_usergroup_modification_group
+    - audit_rules_login_events_lastlog
+    - grub2_audit_argument
+    - grub2_audit_backlog_limit_argument
+    - configure_usbguard_auditbackend
     - package_rsyslog_installed
     - package_rsyslog-gnutls_installed
-    - rsyslog_remote_tls
-    - rsyslog_remote_tls_cacert
-
-    # Unselect zIPL rules from OSPP
-    - "!zipl_bls_entries_only"
-    - "!zipl_bootmap_is_up_to_date"
-    - "!zipl_audit_argument"
-    - "!zipl_audit_backlog_limit_argument"
-    - "!zipl_page_poison_argument"
-    - "!zipl_slub_debug_argument"
-    - "!zipl_vsyscall_argument"
-    - "!zipl_vsyscall_argument.role=unscored"
-    - "!zipl_vsyscall_argument.severity=info"
-
-    - installed_OS_is_vendor_supported
+    - rsyslog_remote_loghost
+    - auditd_data_retention_space_left
+    - auditd_data_retention_space_left_action
+    - chronyd_or_ntpd_set_maxpoll
+    - chronyd_client_only
+    - chronyd_no_chronyc_network
+    - package_telnet-server_removed
+    - package_abrt_removed
+    - package_abrt-addon-ccpp_removed
+    - package_abrt-addon-kerneloops_removed
+    - package_abrt-addon-python_removed
+    - package_abrt-cli_removed
+    - package_abrt-plugin-logger_removed
+    - package_abrt-plugin-rhtsupport_removed
+    - package_abrt-plugin-sosreport_removed
+    - package_sendmail_removed
+    - package_gssproxy_removed
+    - grub2_pti_argument
+    - package_rsh-server_removed
+    - kernel_module_atm_disabled
+    - kernel_module_can_disabled
+    - kernel_module_sctp_disabled
+    - kernel_module_tipc_disabled
+    - kernel_module_cramfs_disabled
+    - kernel_module_firewire-core_disabled
+    - configure_firewalld_ports
+    - service_autofs_disabled
+    - kernel_module_usb-storage_disabled
+    - service_firewalld_enabled
+    - package_firewalld_installed
+    - wireless_disable_interfaces
+    - kernel_module_bluetooth_disabled
+    - mount_option_dev_shm_nodev
+    - mount_option_dev_shm_nosuid
+    - mount_option_dev_shm_noexec
+    - mount_option_tmp_nodev
+    - mount_option_tmp_nosuid
+    - mount_option_tmp_noexec
+    - mount_option_var_log_nodev
+    - mount_option_var_log_nosuid
+    - mount_option_var_log_noexec
+    - mount_option_var_log_audit_nodev
+    - mount_option_var_log_audit_nosuid
+    - mount_option_var_log_audit_noexec
+    - mount_option_var_tmp_nodev
+    - mount_option_var_tmp_nosuid
+    - mount_option_var_tmp_noexec
+    - package_openssh-server_installed
+    - service_sshd_enabled
+    - sshd_rekey_limit
+    - ssh_client_rekey_limit
+    - disable_ctrlaltdel_reboot
+    - dconf_gnome_disable_ctrlaltdel_reboot
+    - disable_ctrlaltdel_burstaction
+    - service_debug-shell_disabled
+    - package_tftp-server_removed
+    - accounts_no_uid_except_zero
+    - sysctl_net_ipv4_conf_default_accept_redirects
+    - sysctl_net_ipv6_conf_default_accept_redirects
+    - sysctl_net_ipv4_conf_all_send_redirects
+    - sysctl_net_ipv4_icmp_echo_ignore_broadcasts
+    - sysctl_net_ipv4_conf_all_accept_source_route
+    - sysctl_net_ipv6_conf_all_accept_source_route
+    - sysctl_net_ipv4_conf_default_accept_source_route
+    - sysctl_net_ipv6_conf_default_accept_source_route
+    - sysctl_net_ipv4_ip_forward
+    - sysctl_net_ipv6_conf_all_accept_ra
+    - sysctl_net_ipv6_conf_default_accept_ra
+    - sysctl_net_ipv4_conf_default_send_redirects
+    - sysctl_net_ipv4_conf_all_accept_redirects
+    - sysctl_net_ipv6_conf_all_accept_redirects
+    - sysctl_kernel_unprivileged_bpf_disabled
+    - sysctl_kernel_yama_ptrace_scope
+    - sysctl_kernel_kptr_restrict
+    - sysctl_user_max_user_namespaces
+    - sysctl_net_ipv4_conf_all_rp_filter
+    - postfix_prevent_unrestricted_relay
+    - aide_verify_ext_attributes
+    - aide_verify_acls
+    - package_xorg-x11-server-common_removed
+    - sshd_disable_x11_forwarding
+    - sshd_x11_use_localhost
+    - tftpd_uses_secure_mode
+    - package_vsftpd_removed
+    - package_gssproxy_removed
+    - package_iprutils_removed
+    - package_tuned_removed
+    - require_emergency_target_auth
+    - require_singleuser_auth
+    - set_password_hashing_algorithm_systemauth
+    - dir_perms_world_writable_sticky_bits
+    - package_aide_installed
+    - aide_scan_notification
+    - install_smartcard_packages
+    - sshd_disable_kerb_auth
+    - sshd_disable_gssapi_auth
+    - accounts_user_dot_no_world_writable_programs
+    - network_configure_name_resolution
+    - dir_perms_world_writable_root_owned
+    - package_tmux_installed
+    - configure_tmux_lock_command
+    - accounts_password_pam_retry
+    - sssd_enable_smartcards
+    - no_empty_passwords
+    - sshd_disable_empty_passwords
+    - file_ownership_var_log_audit
+    - audit_rules_sysadmin_actions
+    - package_audit_installed
+    - service_auditd_enabled
+    - sshd_allow_only_protocol2
+    - package_fapolicyd_installed
+    - service_fapolicyd_enabled
+    - package_usbguard_installed
+    - service_usbguard_enabled
+    - network_sniffer_disabled

From 22cac40b15eb5beb4144c2521021e093509c05ad Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 29 Jan 2021 11:34:57 +0100
Subject: [PATCH 02/21] Add correct variables to RHEL8 STIG missing from OSPP.

They have either a different value from OSPP or they are being
explicitly set even if they are default values.
---
 .../rule.yml                                  |  1 +
 .../rule.yml                                  |  1 +
 .../rule.yml                                  |  1 +
 .../rule.yml                                  |  1 +
 .../ntp/chronyd_or_ntpd_set_maxpoll/rule.yml  |  1 +
 .../ntp/var_time_service_set_maxpoll.var      |  1 +
 .../r_services/no_host_based_files/rule.yml   |  2 ++
 .../no_user_host_based_files/rule.yml         |  1 +
 .../sshd_x11_use_localhost/rule.yml           |  1 +
 .../install_smartcard_packages/rule.yml       |  1 +
 .../accounts_logon_fail_delay/rule.yml        |  1 +
 .../rule.yml                                  |  1 +
 .../accounts_user_home_paths_only/rule.yml    |  1 +
 .../rule.yml                                  |  1 +
 .../file_permission_user_init_files/rule.yml  |  1 +
 .../rule.yml                                  |  1 +
 .../accounts_umask_interactive_users/rule.yml |  1 +
 .../rule.yml                                  |  1 +
 .../auditd_data_disk_error_action/rule.yml    |  1 +
 .../auditd_data_disk_full_action/rule.yml     |  1 +
 .../auditd_data_retention_space_left/rule.yml |  1 +
 .../rule.yml                                  |  1 +
 .../rule.yml                                  |  1 +
 .../fips/sysctl_crypto_fips_enabled/rule.yml  |  1 +
 rhel8/profiles/stig.profile                   | 20 +++++++++++++++++--
 25 files changed, 43 insertions(+), 2 deletions(-)

diff --git a/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml b/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
index 4bfcc16c7f..0a3d818831 100644
--- a/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
+++ b/linux_os/guide/services/mail/postfix_harden_os/postfix_server_cfg/postfix_server_relay/postfix_prevent_unrestricted_relay/rule.yml
@@ -18,6 +18,7 @@ severity: medium
 
 identifiers:
     cce@rhel7: CCE-80512-7
+    cce@rhel8: CCE-84054-6
 
 references:
     stigid@ol7: OL07-00-040680
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
index 3349a7963a..9374bdc065 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
@@ -14,6 +14,7 @@ severity: medium
 
 identifiers:
     cce@rhel7: CCE-80239-7
+    cce@rhel8: CCE-84052-0
 
 references:
     nist: CM-6(a),MP-2
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
index ee6b9aa54a..4a50d79600 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_noexec_remote_filesystems/rule.yml
@@ -17,6 +17,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80436-9
     cce@sle12: CCE-83103-2
+    cce@rhel8: CCE-84050-4
 
 references:
     stigid@ol7: OL07-00-021021
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
index 6b71f94c2b..695e1a1e6c 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nosuid_remote_filesystems/rule.yml
@@ -15,6 +15,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80240-5
     cce@sle12: CCE-83102-4
+    cce@rhel8: CCE-84053-8
 
 references:
     stigid@ol7: OL07-00-021020
diff --git a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
index 9a802b5d5d..8d12b741a9 100644
--- a/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_or_ntpd_set_maxpoll/rule.yml
@@ -27,6 +27,7 @@ identifiers:
     cce@rhel7: CCE-80439-3
     cce@rhcos4: CCE-82684-2
     cce@sle12: CCE-83124-8
+    cce@rhel8: CCE-84059-5
 
 references:
     stigid@ol7: OL07-00-040500
diff --git a/linux_os/guide/services/ntp/var_time_service_set_maxpoll.var b/linux_os/guide/services/ntp/var_time_service_set_maxpoll.var
index 81a7debf25..6dd3ec434c 100644
--- a/linux_os/guide/services/ntp/var_time_service_set_maxpoll.var
+++ b/linux_os/guide/services/ntp/var_time_service_set_maxpoll.var
@@ -10,5 +10,6 @@ interactive: false
 
 options:
     36_hours: 17
+    18_hours: 16
     default: 10
     system_default: 10
diff --git a/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml b/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
index 01eb9e5f99..4944530617 100644
--- a/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
+++ b/linux_os/guide/services/obsolete/r_services/no_host_based_files/rule.yml
@@ -23,6 +23,8 @@ severity: high
 identifiers:
     cce@rhel7: CCE-80513-5
     cce@sle12: CCE-83022-4
+    cce@rhel8: CCE-84055-3
+
 references:
     stigid@ol7: OL07-00-040550
     disa: CCI-000366
diff --git a/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml b/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
index 48bff043a6..efb6386261 100644
--- a/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
+++ b/linux_os/guide/services/obsolete/r_services/no_user_host_based_files/rule.yml
@@ -23,6 +23,7 @@ severity: high
 identifiers:
     cce@rhel7: CCE-80514-3
     cce@sle12: CCE-83021-6
+    cce@rhel8: CCE-84056-1
 
 references:
     stigid@ol7: OL07-00-040540
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
index bee39a3904..664db5e626 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_x11_use_localhost/rule.yml
@@ -22,6 +22,7 @@ severity: medium
 
 identifiers:
     cce@rhel7: CCE-83404-4
+    cce@rhel8: CCE-84058-7
 
 references:
     srg: SRG-OS-000480-GPOS-00227
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
index 29aa49483d..4b8a9c29f5 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
@@ -25,6 +25,7 @@ severity: medium
 
 identifiers:
     cce@rhel7: CCE-80519-2
+    cce@rhel8: CCE-84029-8
 
 references:
     stigid@ol7: OL07-00-041001
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
index e62e3cc62b..d1da3b6963 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
@@ -16,6 +16,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80352-8
     cce@sle12: CCE-83028-1
+    cce@rhel8: CCE-84037-1
 
 references:
     stigid@ol7: OL07-00-010430
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
index b73743ebcb..d41cc0cca4 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_dot_no_world_writable_programs/rule.yml
@@ -21,6 +21,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80523-4
     cce@sle12: CCE-83099-2
+    cce@rhel8: CCE-84039-7
 
 references:
     stigid@ol7: OL07-00-020730
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
index b70bfc171a..143920449b 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_home_paths_only/rule.yml
@@ -25,6 +25,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80524-2
     cce@sle12: CCE-83098-4
+    cce@rhel8: CCE-84040-5
 
 references:
     stigid@ol7: OL07-00-020720
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
index a0e6277ec6..a4cf5c2b2d 100644
--- a/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_user_interactive_home_directory_defined/rule.yml
@@ -17,6 +17,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80528-3
     cce@sle12: CCE-83075-2
+    cce@rhel8: CCE-84036-3
 
 references:
     stigid@ol7: OL07-00-020600
diff --git a/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml b/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
index 411a46dd00..ef6280203f 100644
--- a/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/file_permission_user_init_files/rule.yml
@@ -19,6 +19,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80525-9
     cce@sle12: CCE-83097-6
+    cce@rhel8: CCE-84043-9
 
 references:
     stigid@ol7: OL07-00-020710
diff --git a/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml b/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
index 62d603cfbb..561f9f1394 100644
--- a/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/file_permissions_home_directories/rule.yml
@@ -19,6 +19,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80530-9
     cce@sle12: CCE-83076-0
+    cce@rhel8: CCE-84038-9
 
 references:
     stigid@ol7: OL07-00-020630
diff --git a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
index 7629fcb3e4..f3648011c5 100644
--- a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_interactive_users/rule.yml
@@ -18,6 +18,7 @@ severity: medium
 
 identifiers:
     cce@rhel7: CCE-80536-6
+    cce@rhel8: CCE-84044-7
 
 references:
     stigid@ol7: OL07-00-021040
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
index 09618d986d..b9ff8233bb 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
@@ -16,6 +16,7 @@ severity: unknown
 
 identifiers:
     cce@rhcos4: CCE-82692-5
+    cce@rhel8: CCE-84048-8
 
 references:
     nist: CM-6(a),AC-6(1),AU-9
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
index 442b693951..d3646de8ff 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
@@ -24,6 +24,7 @@ severity: medium
 identifiers:
     cce@rhel7: CCE-80646-3
     cce@rhcos4: CCE-82679-2
+    cce@rhel8: CCE-84046-2
 
 references:
     nist: AU-5(b),AU-5(2),AU-5(1),AU-5(4),CM-6(a)
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
index 01a5c5201d..d92afe34e8 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
@@ -27,6 +27,7 @@ severity: medium
 identifiers:
     cce@rhcos4: CCE-82676-8
     cce@sle12: CCE-83032-3
+    cce@rhel8: CCE-84045-4
 
 references:
     nist: AU-5(b),AU-5(2),AU-5(1),AU-5(4),CM-6(a)
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
index 2f37c5b0e4..f1a742a810 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
@@ -23,6 +23,7 @@ identifiers:
     cce@rhel7: CCE-80537-4
     cce@rhcos4: CCE-82681-8
     cce@sle12: CCE-83026-5
+    cce@rhel8: CCE-84047-0
 
 references:
     stigid@ol7: OL07-00-030330
diff --git a/linux_os/guide/system/network/network_configure_name_resolution/rule.yml b/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
index a9c6550b47..8450e29bf7 100644
--- a/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
+++ b/linux_os/guide/system/network/network_configure_name_resolution/rule.yml
@@ -26,6 +26,7 @@ severity: low
 
 identifiers:
     cce@rhel7: CCE-80438-5
+    cce@rhel8: CCE-84049-6
 
 references:
     stigid@ol7: OL07-00-040600
diff --git a/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml b/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
index fae18baff6..d89bc407c7 100644
--- a/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
+++ b/linux_os/guide/system/software/gnome/gnome_system_settings/dconf_gnome_disable_ctrlaltdel_reboot/rule.yml
@@ -30,6 +30,7 @@ severity: high
 
 identifiers:
     cce@rhel7: CCE-80124-1
+    cce@rhel8: CCE-84028-0
 
 references:
     stigid@ol7: OL07-00-020231
diff --git a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
index 0807f512fb..8753e4aeef 100644
--- a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
@@ -23,6 +23,7 @@ platform: machine  # The oscap sysctl probe doesn't support offline mode
 
 identifiers:
     cce@rhel7: CCE-80658-8
+    cce@rhel8: CCE-84027-2
 
 references:
     disa: CCI-000068,CCI-000803,CCI-002450
diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 03ce772734..66cc5007be 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -24,12 +24,16 @@ description: |-
     - Red Hat Containers with a Red Hat Enterprise Linux 8 image
 
 selections:
+    # variables
     - var_rekey_limit_size=1G
     - var_rekey_limit_time=1hour
     - var_accounts_user_umask=077
-    - var_password_pam_difok=4
+    - var_password_pam_difok=8
     - var_password_pam_maxrepeat=3
+    - var_sshd_disable_compression=no
     - var_password_pam_maxclassrepeat=4
+    - var_password_pam_minclass=4
+    - var_accounts_minimum_age_login_defs=1
     - var_accounts_max_concurrent_login_sessions=10
     - var_password_pam_unix_remember=5
     - var_selinux_state=enforcing
@@ -41,6 +45,8 @@ selections:
     - var_password_pam_dcredit=1
     - var_password_pam_ucredit=1
     - var_password_pam_lcredit=1
+    - var_password_pam_retry=3
+    - var_password_pam_minlen=15
     - sshd_idle_timeout_value=10_minutes
     - var_accounts_passwords_pam_faillock_deny=3
     - var_accounts_passwords_pam_faillock_fail_interval=900
@@ -48,8 +54,18 @@ selections:
     - var_ssh_client_rekey_limit_size=1G
     - var_ssh_client_rekey_limit_time=1hour
     - var_accounts_fail_delay=4
+    - var_account_disable_post_pw_expiration=35
+    - var_auditd_action_mail_acct=root
+    - var_time_service_set_maxpoll=18_hours
+    - var_password_hashing_algorithm=SHA512
+    - var_accounts_maximum_age_login_defs=60
+    - var_auditd_space_left=250MB
+    - var_auditd_space_left_action=email
+    - var_auditd_disk_error_action=halt
+    - var_auditd_max_log_file_action=syslog
+    - var_auditd_disk_full_action=halt
 
-
+    # rules
     - installed_OS_is_vendor_supported
     - security_patches_up_to_date
     - enable_fips_mode

From e9d4aa6be77d6da201a748652effcf150cfaf18e Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 29 Jan 2021 13:52:43 +0100
Subject: [PATCH 03/21] Update RHEL8 STIG profile stability data.

---
 .../data/profile_stability/rhel8/stig.profile | 207 +++++++++++-------
 1 file changed, 122 insertions(+), 85 deletions(-)

diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index 6676ca497c..9089f7ef4f 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -25,92 +25,110 @@ reference: https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-s
 selections:
 - account_disable_post_pw_expiration
 - account_temp_expire_date
+- accounts_have_homedir_login_defs
+- accounts_logon_fail_delay
 - accounts_max_concurrent_login_sessions
+- accounts_maximum_age_login_defs
+- accounts_minimum_age_login_defs
+- accounts_no_uid_except_zero
 - accounts_password_minlen_login_defs
 - accounts_password_pam_dcredit
 - accounts_password_pam_difok
-- accounts_password_pam_enforce_local
-- accounts_password_pam_enforce_root
 - accounts_password_pam_lcredit
 - accounts_password_pam_maxclassrepeat
 - accounts_password_pam_maxrepeat
+- accounts_password_pam_minclass
 - accounts_password_pam_minlen
 - accounts_password_pam_ocredit
+- accounts_password_pam_retry
 - accounts_password_pam_ucredit
 - accounts_password_pam_unix_remember
 - accounts_password_set_max_life_existing
 - accounts_password_set_min_life_existing
 - accounts_passwords_pam_faillock_deny
+- accounts_passwords_pam_faillock_deny_root
 - accounts_passwords_pam_faillock_interval
 - accounts_passwords_pam_faillock_unlock_time
 - accounts_umask_etc_bashrc
-- accounts_umask_etc_csh_cshrc
-- accounts_umask_etc_profile
-- audit_access_failed
-- audit_access_success
-- audit_basic_configuration
-- audit_create_failed
-- audit_create_success
-- audit_delete_failed
-- audit_delete_success
+- accounts_umask_etc_login_defs
+- accounts_umask_interactive_users
+- accounts_user_dot_no_world_writable_programs
+- accounts_user_home_paths_only
+- accounts_user_interactive_home_directory_defined
+- accounts_user_interactive_home_directory_exists
+- aide_scan_notification
+- aide_verify_acls
+- aide_verify_ext_attributes
 - audit_immutable_login_uids
-- audit_modify_failed
-- audit_modify_success
-- audit_module_load
-- audit_ospp_general
-- audit_owner_change_failed
-- audit_owner_change_success
-- audit_perm_change_failed
-- audit_perm_change_success
+- audit_rules_immutable
+- audit_rules_login_events_lastlog
+- audit_rules_sysadmin_actions
+- audit_rules_usergroup_modification_group
+- audit_rules_usergroup_modification_gshadow
+- audit_rules_usergroup_modification_opasswd
 - audit_rules_usergroup_modification_passwd
-- auditd_audispd_syslog_plugin_activated
-- auditd_data_retention_flush
-- auditd_freq
+- audit_rules_usergroup_modification_shadow
+- auditd_data_disk_error_action
+- auditd_data_disk_full_action
+- auditd_data_retention_action_mail_acct
+- auditd_data_retention_max_log_file_action
+- auditd_data_retention_space_left
+- auditd_data_retention_space_left_action
 - auditd_local_events
 - auditd_log_format
 - auditd_name_format
-- auditd_write_logs
 - banner_etc_issue
 - chronyd_client_only
 - chronyd_no_chronyc_network
+- chronyd_or_ntpd_set_maxpoll
 - clean_components_post_updating
 - configure_bashrc_exec_tmux
-- configure_bind_crypto_policy
-- configure_crypto_policy
-- configure_kerberos_crypto_policy
-- configure_libreswan_crypto_policy
-- configure_openssl_crypto_policy
-- configure_ssh_crypto_policy
+- configure_firewalld_ports
 - configure_tmux_lock_after_time
 - configure_tmux_lock_command
 - configure_usbguard_auditbackend
 - coredump_disable_backtraces
 - coredump_disable_storage
-- dconf_db_up_to_date
 - dconf_gnome_banner_enabled
+- dconf_gnome_disable_ctrlaltdel_reboot
 - dconf_gnome_login_banner_text
+- dconf_gnome_screensaver_idle_delay
+- dconf_gnome_screensaver_lock_enabled
+- dir_perms_world_writable_root_owned
+- dir_perms_world_writable_sticky_bits
+- directory_permissions_var_log_audit
 - disable_ctrlaltdel_burstaction
 - disable_ctrlaltdel_reboot
-- disable_host_auth
 - disable_users_coredumps
-- dnf-automatic_apply_updates
-- dnf-automatic_security_updates_only
-- enable_dracut_fips_module
+- display_login_attempts
 - enable_fips_mode
 - encrypt_partitions
 - ensure_gpgcheck_globally_activated
 - ensure_gpgcheck_local_packages
-- ensure_gpgcheck_never_disabled
-- ensure_redhat_gpgkey_installed
+- file_groupownership_home_directories
+- file_ownership_binary_dirs
+- file_ownership_library_dirs
+- file_ownership_var_log_audit
+- file_permission_user_init_files
+- file_permissions_binary_dirs
+- file_permissions_home_directories
+- file_permissions_library_dirs
+- file_permissions_sshd_private_key
+- file_permissions_sshd_pub_key
+- file_permissions_ungroupowned
+- file_permissions_var_log_audit
+- gnome_gdm_disable_automatic_login
+- grub2_admin_username
 - grub2_audit_argument
 - grub2_audit_backlog_limit_argument
-- grub2_disable_interactive_boot
-- grub2_kernel_trust_cpu_rng
 - grub2_page_poison_argument
+- grub2_password
 - grub2_pti_argument
 - grub2_slub_debug_argument
+- grub2_uefi_admin_username
 - grub2_uefi_password
 - grub2_vsyscall_argument
+- install_smartcard_packages
 - installed_OS_is_vendor_supported
 - kerberos_disable_no_keytab
 - kernel_module_atm_disabled
@@ -120,14 +138,19 @@ selections:
 - kernel_module_firewire-core_disabled
 - kernel_module_sctp_disabled
 - kernel_module_tipc_disabled
-- mount_option_boot_nodev
+- kernel_module_usb-storage_disabled
 - mount_option_boot_nosuid
 - mount_option_dev_shm_nodev
 - mount_option_dev_shm_noexec
 - mount_option_dev_shm_nosuid
-- mount_option_home_nodev
 - mount_option_home_nosuid
 - mount_option_nodev_nonroot_local_partitions
+- mount_option_nodev_remote_filesystems
+- mount_option_nodev_removable_partitions
+- mount_option_noexec_remote_filesystems
+- mount_option_noexec_removable_partitions
+- mount_option_nosuid_remote_filesystems
+- mount_option_nosuid_removable_partitions
 - mount_option_tmp_nodev
 - mount_option_tmp_noexec
 - mount_option_tmp_nosuid
@@ -137,13 +160,16 @@ selections:
 - mount_option_var_log_nodev
 - mount_option_var_log_noexec
 - mount_option_var_log_nosuid
-- mount_option_var_nodev
 - mount_option_var_tmp_nodev
 - mount_option_var_tmp_noexec
 - mount_option_var_tmp_nosuid
+- network_configure_name_resolution
+- network_sniffer_disabled
 - no_empty_passwords
+- no_files_unowned_by_user
+- no_host_based_files
 - no_tmux_in_shells
-- openssl_use_strong_entropy
+- no_user_host_based_files
 - package_abrt-addon-ccpp_removed
 - package_abrt-addon-kerneloops_removed
 - package_abrt-addon-python_removed
@@ -153,66 +179,76 @@ selections:
 - package_abrt-plugin-sosreport_removed
 - package_abrt_removed
 - package_aide_installed
-- package_audispd-plugins_installed
 - package_audit_installed
-- package_chrony_installed
-- package_crypto-policies_installed
-- package_dnf-automatic_installed
-- package_dnf-plugin-subscription-manager_installed
 - package_fapolicyd_installed
 - package_firewalld_installed
-- package_gnutls-utils_installed
 - package_gssproxy_removed
 - package_iprutils_removed
 - package_krb5-workstation_removed
-- package_libcap-ng-utils_installed
-- package_nfs-utils_removed
-- package_openscap-scanner_installed
-- package_openssh-clients_installed
+- package_opensc_installed
 - package_openssh-server_installed
-- package_policycoreutils-python-utils_installed
 - package_policycoreutils_installed
+- package_rsh-server_removed
 - package_rsyslog-gnutls_installed
 - package_rsyslog_installed
-- package_scap-security-guide_installed
 - package_sendmail_removed
-- package_subscription-manager_installed
-- package_sudo_installed
+- package_telnet-server_removed
+- package_tftp-server_removed
 - package_tmux_installed
+- package_tuned_removed
 - package_usbguard_installed
+- package_vsftpd_removed
+- package_xorg-x11-server-common_removed
 - partition_for_home
+- partition_for_tmp
 - partition_for_var
 - partition_for_var_log
 - partition_for_var_log_audit
+- postfix_client_configure_mail_alias
+- postfix_prevent_unrestricted_relay
+- require_emergency_target_auth
 - require_singleuser_auth
-- rsyslog_remote_tls
-- rsyslog_remote_tls_cacert
-- securetty_root_login_console_only
+- rsyslog_cron_logging
+- rsyslog_remote_loghost
+- security_patches_up_to_date
 - selinux_policytype
 - selinux_state
 - service_auditd_enabled
+- service_autofs_disabled
 - service_debug-shell_disabled
 - service_fapolicyd_enabled
 - service_firewalld_enabled
 - service_kdump_disabled
+- service_rngd_enabled
+- service_rsyslog_enabled
+- service_sshd_enabled
 - service_systemd-coredump_disabled
 - service_usbguard_enabled
-- smartcard_configure_cert_checking
+- set_password_hashing_algorithm_logindefs
+- set_password_hashing_algorithm_systemauth
 - ssh_client_rekey_limit
-- ssh_client_use_strong_rng_csh
-- ssh_client_use_strong_rng_sh
+- sshd_allow_only_protocol2
+- sshd_disable_compression
 - sshd_disable_empty_passwords
 - sshd_disable_gssapi_auth
 - sshd_disable_kerb_auth
 - sshd_disable_root_login
+- sshd_disable_user_known_hosts
+- sshd_disable_x11_forwarding
+- sshd_do_not_permit_user_env
 - sshd_enable_strictmodes
 - sshd_enable_warning_banner
+- sshd_print_last_log
 - sshd_rekey_limit
 - sshd_set_idle_timeout
 - sshd_set_keepalive
 - sshd_use_strong_rng
+- sshd_x11_use_localhost
 - sssd_enable_smartcards
 - sssd_offline_cred_expiration
+- sudo_remove_no_authenticate
+- sudo_remove_nopasswd
+- sysctl_crypto_fips_enabled
 - sysctl_fs_protected_hardlinks
 - sysctl_fs_protected_symlinks
 - sysctl_kernel_core_pattern
@@ -220,25 +256,18 @@ selections:
 - sysctl_kernel_kexec_load_disabled
 - sysctl_kernel_kptr_restrict
 - sysctl_kernel_perf_event_paranoid
+- sysctl_kernel_randomize_va_space
 - sysctl_kernel_unprivileged_bpf_disabled
 - sysctl_kernel_yama_ptrace_scope
-- sysctl_net_core_bpf_jit_harden
 - sysctl_net_ipv4_conf_all_accept_redirects
 - sysctl_net_ipv4_conf_all_accept_source_route
-- sysctl_net_ipv4_conf_all_log_martians
 - sysctl_net_ipv4_conf_all_rp_filter
-- sysctl_net_ipv4_conf_all_secure_redirects
 - sysctl_net_ipv4_conf_all_send_redirects
 - sysctl_net_ipv4_conf_default_accept_redirects
 - sysctl_net_ipv4_conf_default_accept_source_route
-- sysctl_net_ipv4_conf_default_log_martians
-- sysctl_net_ipv4_conf_default_rp_filter
-- sysctl_net_ipv4_conf_default_secure_redirects
 - sysctl_net_ipv4_conf_default_send_redirects
 - sysctl_net_ipv4_icmp_echo_ignore_broadcasts
-- sysctl_net_ipv4_icmp_ignore_bogus_error_responses
 - sysctl_net_ipv4_ip_forward
-- sysctl_net_ipv4_tcp_syncookies
 - sysctl_net_ipv6_conf_all_accept_ra
 - sysctl_net_ipv6_conf_all_accept_redirects
 - sysctl_net_ipv6_conf_all_accept_source_route
@@ -246,36 +275,44 @@ selections:
 - sysctl_net_ipv6_conf_default_accept_redirects
 - sysctl_net_ipv6_conf_default_accept_source_route
 - sysctl_user_max_user_namespaces
-- timer_dnf-automatic_enabled
-- usbguard_allow_hid_and_hub
-- use_pam_wheel_for_su
+- tftpd_uses_secure_mode
+- wireless_disable_interfaces
 - var_rekey_limit_size=1G
 - var_rekey_limit_time=1hour
-- var_accounts_user_umask=027
-- var_password_pam_difok=4
+- var_accounts_user_umask=077
+- var_password_pam_difok=8
 - var_password_pam_maxrepeat=3
+- var_sshd_disable_compression=no
 - var_password_pam_maxclassrepeat=4
-- var_auditd_flush=incremental_async
+- var_password_pam_minclass=4
+- var_accounts_minimum_age_login_defs=1
 - var_accounts_max_concurrent_login_sessions=10
 - var_password_pam_unix_remember=5
 - var_selinux_state=enforcing
 - var_selinux_policy_name=targeted
 - var_system_crypto_policy=fips_ospp
-- var_accounts_password_minlen_login_defs=12
-- var_password_pam_minlen=12
+- var_accounts_password_minlen_login_defs=15
+- var_password_pam_minlen=15
 - var_password_pam_ocredit=1
 - var_password_pam_dcredit=1
 - var_password_pam_ucredit=1
 - var_password_pam_lcredit=1
-- sshd_idle_timeout_value=14_minutes
+- var_password_pam_retry=3
+- sshd_idle_timeout_value=10_minutes
 - var_accounts_passwords_pam_faillock_deny=3
 - var_accounts_passwords_pam_faillock_fail_interval=900
 - var_accounts_passwords_pam_faillock_unlock_time=never
 - var_ssh_client_rekey_limit_size=1G
 - var_ssh_client_rekey_limit_time=1hour
-- login_banner_text=dod_banners
-- grub2_vsyscall_argument.role=unscored
-- grub2_vsyscall_argument.severity=info
-- sysctl_user_max_user_namespaces.role=unscored
-- sysctl_user_max_user_namespaces.severity=info
-title: '[DRAFT] DISA STIG for Red Hat Enterprise Linux 8'
+- var_accounts_fail_delay=4
+- var_account_disable_post_pw_expiration=35
+- var_auditd_action_mail_acct=root
+- var_time_service_set_maxpoll=18_hours
+- var_password_hashing_algorithm=SHA512
+- var_accounts_maximum_age_login_defs=60
+- var_auditd_space_left=250MB
+- var_auditd_space_left_action=email
+- var_auditd_disk_error_action=halt
+- var_auditd_max_log_file_action=syslog
+- var_auditd_disk_full_action=halt
+title: DISA STIG for Red Hat Enterprise Linux 8

From 443d09de1487b35d4fc8bbc146ddd74a4412f7f4 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Tue, 2 Feb 2021 13:42:40 +0100
Subject: [PATCH 04/21] Set openssl-pkcs11 as default package for
 install_smartcard_packages.

---
 .../install_smartcard_packages/rule.yml              | 12 +++++++++++-
 1 file changed, 11 insertions(+), 1 deletion(-)

diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
index 4b8a9c29f5..d64240dce2 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages/rule.yml
@@ -7,7 +7,11 @@ title: 'Install Smart Card Packages For Multifactor Authentication'
 description: |-
     Configure the operating system to implement multifactor authentication by
     installing the required package with the following command:
+    {{%- if product in ["rhel7", "ol7"] %}}
     {{{ describe_package_install(package="pam_pkcs11") }}}
+    {{%- else %}}
+    {{{ describe_package_install(package="openssl-pkcs11") }}}
+    {{%- endif %}}
 
 rationale: |-
     Using an authentication device, such as a CAC or token that is separate from
@@ -37,9 +41,15 @@ references:
 
 ocil_clause: 'smartcard software is not installed'
 
+{{%- if product in ["rhel7", "ol7"] %}}
 ocil: '{{{ ocil_package(package="pam_pkcs11") }}}'
+{{%- else %}}
+ocil: '{{{ ocil_package(package="openssl-pkcs11") }}}'
+{{%- endif %}}
 
 template:
     name: package_installed
     vars:
-        pkgname: pam_pkcs11
+        pkgname: openssl-pkcs11
+        pkgname@rhel7: pam_pkcs11
+        pkgname@ol7: pam_pkcs11

From 628065d65e0ab363dcdbb513f17a28ae839cefb5 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 4 Feb 2021 19:09:44 +0100
Subject: [PATCH 05/21] Remove conflicting rules from RHEL8 STIG profile.

---
 rhel8/profiles/stig.profile | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 66cc5007be..24eb0f9e21 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -223,7 +223,7 @@ selections:
     - package_abrt-plugin-rhtsupport_removed
     - package_abrt-plugin-sosreport_removed
     - package_sendmail_removed
-    - package_gssproxy_removed
+    # - package_gssproxy_removed
     - grub2_pti_argument
     - package_rsh-server_removed
     - kernel_module_atm_disabled
@@ -286,7 +286,7 @@ selections:
     - postfix_prevent_unrestricted_relay
     - aide_verify_ext_attributes
     - aide_verify_acls
-    - package_xorg-x11-server-common_removed
+    # - package_xorg-x11-server-common_removed
     - sshd_disable_x11_forwarding
     - sshd_x11_use_localhost
     - tftpd_uses_secure_mode

From 917744300baa99686955239f6e73b193a7c1e2b9 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Mon, 8 Feb 2021 15:47:09 +0100
Subject: [PATCH 06/21] Remove duplicate rule gssproxy package removed from
 STIG.

---
 rhel8/profiles/stig.profile                     | 1 -
 tests/data/profile_stability/rhel8/stig.profile | 2 --
 2 files changed, 3 deletions(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 24eb0f9e21..34f9f79461 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -291,7 +291,6 @@ selections:
     - sshd_x11_use_localhost
     - tftpd_uses_secure_mode
     - package_vsftpd_removed
-    - package_gssproxy_removed
     - package_iprutils_removed
     - package_tuned_removed
     - require_emergency_target_auth
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index 9089f7ef4f..bc5153fa99 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -182,7 +182,6 @@ selections:
 - package_audit_installed
 - package_fapolicyd_installed
 - package_firewalld_installed
-- package_gssproxy_removed
 - package_iprutils_removed
 - package_krb5-workstation_removed
 - package_opensc_installed
@@ -198,7 +197,6 @@ selections:
 - package_tuned_removed
 - package_usbguard_installed
 - package_vsftpd_removed
-- package_xorg-x11-server-common_removed
 - partition_for_home
 - partition_for_tmp
 - partition_for_var

From 9455a5059b09de9bb9d4f5faeca7896246bc2e0e Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Mon, 8 Feb 2021 17:54:07 +0100
Subject: [PATCH 07/21] Remove one file based audit rule from RHEL8 STIG
 profile.

---
 rhel8/profiles/stig.profile | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 34f9f79461..a5f8f54de1 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -195,7 +195,7 @@ selections:
     - file_permissions_var_log_audit
     - directory_permissions_var_log_audit
     - audit_rules_immutable
-    - audit_immutable_login_uids
+    # - audit_immutable_login_uids
     - audit_rules_usergroup_modification_shadow
     - audit_rules_usergroup_modification_opasswd
     - audit_rules_usergroup_modification_passwd

From 987b198504bd45e40a3c4e090ebf36e69f18d43c Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Mon, 8 Feb 2021 17:54:26 +0100
Subject: [PATCH 08/21] Increase size of /var partition in RHEL8 STIG
 kickstart.

Set mount options nosuid, nodev and noexec to /boot partition.
---
 rhel8/kickstart/ssg-rhel8-stig-ks.cfg | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/rhel8/kickstart/ssg-rhel8-stig-ks.cfg b/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
index 28f7ff0927..3e8be668bd 100644
--- a/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
+++ b/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
@@ -100,7 +100,7 @@ zerombr
 clearpart --linux --initlabel
 
 # Create primary system partitions (required for installs)
-part /boot --fstype=xfs --size=512
+part /boot --fstype=xfs --size=512 --fsoptions="nodev,nosuid,noexec"
 part pv.01 --grow --size=1
 
 # Create a Logical Volume Management (LVM) group (optional)

From 446e9b79aa6cc40ab42c95292914835fa18d0b69 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Tue, 9 Feb 2021 14:33:30 +0100
Subject: [PATCH 09/21] Add package_rng-tools_installed because it is
 dependency of rngd service.

---
 rhel8/profiles/stig.profile | 1 +
 1 file changed, 1 insertion(+)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index a5f8f54de1..91ce77b4de 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -110,6 +110,7 @@ selections:
     - no_host_based_files
     - no_user_host_based_files
     - service_rngd_enabled
+    - package_rng-tools_installed
     - file_permissions_sshd_pub_key
     - file_permissions_sshd_private_key
     - sshd_enable_strictmodes

From d61652ed418bb4d6b07a88f1bee1bda15196e23e Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Tue, 9 Feb 2021 14:35:53 +0100
Subject: [PATCH 10/21] Remove draft verbiage from description in RHEL8 STIG
 profile.

---
 rhel8/profiles/stig.profile | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 91ce77b4de..017e72ee2d 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -11,7 +11,7 @@ title: 'DISA STIG for Red Hat Enterprise Linux 8'
 
 description: |-
     This profile contains configuration checks that align to the
-    [DRAFT] DISA STIG for Red Hat Enterprise Linux 8.
+    DISA STIG for Red Hat Enterprise Linux 8.
 
     In addition to being applicable to Red Hat Enterprise Linux 8, DISA recognizes this
     configuration baseline as applicable to the operating system tier of

From 9fa00acb2c1b551c26418ce2ff606a579e7fe192 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Wed, 10 Feb 2021 12:24:05 +0100
Subject: [PATCH 11/21] Update RHEL8 STIG profile stability data.

---
 tests/data/profile_stability/rhel8/stig.profile | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index bc5153fa99..668c258306 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -1,6 +1,6 @@
 description: 'This profile contains configuration checks that align to the
 
-    [DRAFT] DISA STIG for Red Hat Enterprise Linux 8.
+    DISA STIG for Red Hat Enterprise Linux 8.
 
 
     In addition to being applicable to Red Hat Enterprise Linux 8, DISA recognizes
@@ -59,7 +59,6 @@ selections:
 - aide_scan_notification
 - aide_verify_acls
 - aide_verify_ext_attributes
-- audit_immutable_login_uids
 - audit_rules_immutable
 - audit_rules_login_events_lastlog
 - audit_rules_sysadmin_actions
@@ -187,6 +186,7 @@ selections:
 - package_opensc_installed
 - package_openssh-server_installed
 - package_policycoreutils_installed
+- package_rng-tools_installed
 - package_rsh-server_removed
 - package_rsyslog-gnutls_installed
 - package_rsyslog_installed

From 91a77ac9fce7ba96ba80d2d33efa0b82c5329807 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Wed, 10 Feb 2021 12:47:45 +0100
Subject: [PATCH 12/21] Fix duplicated CCE.

---
 .../auditd_data_retention_space_left/rule.yml                   | 2 +-
 shared/references/cce-redhat-avail.txt                          | 1 -
 2 files changed, 1 insertion(+), 2 deletions(-)

diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
index f1a742a810..7d84595498 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/rule.yml
@@ -23,7 +23,7 @@ identifiers:
     cce@rhel7: CCE-80537-4
     cce@rhcos4: CCE-82681-8
     cce@sle12: CCE-83026-5
-    cce@rhel8: CCE-84047-0
+    cce@rhel8: CCE-83619-7
 
 references:
     stigid@ol7: OL07-00-030330
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
index 15bf569a4a..9a5b9703af 100644
--- a/shared/references/cce-redhat-avail.txt
+++ b/shared/references/cce-redhat-avail.txt
@@ -124,7 +124,6 @@ CCE-83615-5
 CCE-83616-3
 CCE-83617-1
 CCE-83618-9
-CCE-83619-7
 CCE-83620-5
 CCE-83621-3
 CCE-83622-1

From ba53084a041ae151d50f237c58efd136be89012c Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 11 Feb 2021 12:47:56 +0100
Subject: [PATCH 13/21] Add bootloader password to RHEL8 STIG kickstart
 example.

---
 rhel8/kickstart/ssg-rhel8-stig-ks.cfg | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/rhel8/kickstart/ssg-rhel8-stig-ks.cfg b/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
index 3e8be668bd..0ec942bb8b 100644
--- a/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
+++ b/rhel8/kickstart/ssg-rhel8-stig-ks.cfg
@@ -83,10 +83,11 @@ selinux --enforcing
 timezone --utc America/New_York
 
 # Specify how the bootloader should be installed (required)
+# Plaintext password is: password
 # Refer to e.g.
 #   https://pykickstart.readthedocs.io/en/latest/commands.html#rootpw
 # to see how to create encrypted password form for different plaintext password
-bootloader --location=mbr --append="audit=1 audit_backlog_limit=8192 slub_debug=P page_poison=1 vsyscall=none"
+bootloader --location=mbr --append="audit=1 audit_backlog_limit=8192 slub_debug=P page_poison=1 vsyscall=none" --password=$6$zCPaBARiNlBYUAS7$40phthWpqvaPVz3QUeIK6n5qoazJDJD5Nlc9OKy5SyYoX9Rt4jFaLjzqJCwpgR4RVAEFSADsqQot0WKs5qNto0
 
 # Initialize (format) all disks (optional)
 zerombr

From 8c7bea0728745c6a25502d26fbb30053b7888261 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 11 Feb 2021 12:49:02 +0100
Subject: [PATCH 14/21] Update RHEL8 STIG profile with FIPS rules.

---
 rhel8/profiles/stig.profile | 16 ++++++++++++++--
 1 file changed, 14 insertions(+), 2 deletions(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 017e72ee2d..201a5c6ca6 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -38,7 +38,6 @@ selections:
     - var_password_pam_unix_remember=5
     - var_selinux_state=enforcing
     - var_selinux_policy_name=targeted
-    - var_system_crypto_policy=fips_ospp
     - var_accounts_password_minlen_login_defs=15
     - var_password_pam_minlen=15
     - var_password_pam_ocredit=1
@@ -65,10 +64,21 @@ selections:
     - var_auditd_max_log_file_action=syslog
     - var_auditd_disk_full_action=halt
 
+    ### Enable / Configure FIPS
+    - enable_fips_mode
+    - var_system_crypto_policy=fips
+    - configure_crypto_policy
+    - configure_ssh_crypto_policy
+    - configure_bind_crypto_policy
+    - configure_openssl_crypto_policy
+    - configure_libreswan_crypto_policy
+    - configure_kerberos_crypto_policy
+    - enable_dracut_fips_module
+
     # rules
     - installed_OS_is_vendor_supported
     - security_patches_up_to_date
-    - enable_fips_mode
+
     - sysctl_crypto_fips_enabled
     - encrypt_partitions
     - sshd_enable_warning_banner
@@ -211,6 +221,7 @@ selections:
     - rsyslog_remote_loghost
     - auditd_data_retention_space_left
     - auditd_data_retention_space_left_action
+    # remediation fails because default configuration file contains pool instead of server keyword
     - chronyd_or_ntpd_set_maxpoll
     - chronyd_client_only
     - chronyd_no_chronyc_network
@@ -284,6 +295,7 @@ selections:
     - sysctl_kernel_kptr_restrict
     - sysctl_user_max_user_namespaces
     - sysctl_net_ipv4_conf_all_rp_filter
+    # /etc/postfix/main.cf does not exist on default installation resulting in error during remediation
     - postfix_prevent_unrestricted_relay
     - aide_verify_ext_attributes
     - aide_verify_acls

From 6735cc0b910e75a1909d774efbf033781c6ad424 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 11 Feb 2021 13:29:33 +0100
Subject: [PATCH 15/21] Update RHEL8 STIG profile stability test data.

---
 tests/data/profile_stability/rhel8/stig.profile | 9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index 668c258306..f120201c91 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -82,7 +82,13 @@ selections:
 - chronyd_or_ntpd_set_maxpoll
 - clean_components_post_updating
 - configure_bashrc_exec_tmux
+- configure_bind_crypto_policy
+- configure_crypto_policy
 - configure_firewalld_ports
+- configure_kerberos_crypto_policy
+- configure_libreswan_crypto_policy
+- configure_openssl_crypto_policy
+- configure_ssh_crypto_policy
 - configure_tmux_lock_after_time
 - configure_tmux_lock_command
 - configure_usbguard_auditbackend
@@ -100,6 +106,7 @@ selections:
 - disable_ctrlaltdel_reboot
 - disable_users_coredumps
 - display_login_attempts
+- enable_dracut_fips_module
 - enable_fips_mode
 - encrypt_partitions
 - ensure_gpgcheck_globally_activated
@@ -288,7 +295,6 @@ selections:
 - var_password_pam_unix_remember=5
 - var_selinux_state=enforcing
 - var_selinux_policy_name=targeted
-- var_system_crypto_policy=fips_ospp
 - var_accounts_password_minlen_login_defs=15
 - var_password_pam_minlen=15
 - var_password_pam_ocredit=1
@@ -313,4 +319,5 @@ selections:
 - var_auditd_disk_error_action=halt
 - var_auditd_max_log_file_action=syslog
 - var_auditd_disk_full_action=halt
+- var_system_crypto_policy=fips
 title: DISA STIG for Red Hat Enterprise Linux 8

From b8068d4c2edfb90b4ec75f9d1bb83af78dbb468e Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 11 Feb 2021 17:40:40 +0100
Subject: [PATCH 16/21] Remove postfix_prevent_unrestricted_relay from RHEL8
 STIG profile.

The check doesn't consider if the package postfix is installed or not,
which in this case is a hard requirement.
---
 rhel8/profiles/stig.profile                     | 3 ++-
 tests/data/profile_stability/rhel8/stig.profile | 1 -
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 201a5c6ca6..7aea226c95 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -296,7 +296,8 @@ selections:
     - sysctl_user_max_user_namespaces
     - sysctl_net_ipv4_conf_all_rp_filter
     # /etc/postfix/main.cf does not exist on default installation resulting in error during remediation
-    - postfix_prevent_unrestricted_relay
+    # there needs to be a new platform check to identify when postfix is installed or not
+    # - postfix_prevent_unrestricted_relay
     - aide_verify_ext_attributes
     - aide_verify_acls
     # - package_xorg-x11-server-common_removed
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index f120201c91..2c574382a8 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -210,7 +210,6 @@ selections:
 - partition_for_var_log
 - partition_for_var_log_audit
 - postfix_client_configure_mail_alias
-- postfix_prevent_unrestricted_relay
 - require_emergency_target_auth
 - require_singleuser_auth
 - rsyslog_cron_logging

From ee253e573e7b571e593666dfe12a5ac0fb240bf5 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Thu, 11 Feb 2021 17:58:43 +0100
Subject: [PATCH 17/21] Disable audit rules from RHEL8 STIG profile
 temporarily.

Audit rules should be evaluated first implemented using new approach.
---
 rhel8/profiles/stig.profile                     | 16 ++++++++--------
 tests/data/profile_stability/rhel8/stig.profile |  7 -------
 2 files changed, 8 insertions(+), 15 deletions(-)

diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
index 7aea226c95..0aa6f28986 100644
--- a/rhel8/profiles/stig.profile
+++ b/rhel8/profiles/stig.profile
@@ -205,14 +205,14 @@ selections:
     - auditd_log_format
     - file_permissions_var_log_audit
     - directory_permissions_var_log_audit
-    - audit_rules_immutable
+    # - audit_rules_immutable
     # - audit_immutable_login_uids
-    - audit_rules_usergroup_modification_shadow
-    - audit_rules_usergroup_modification_opasswd
-    - audit_rules_usergroup_modification_passwd
-    - audit_rules_usergroup_modification_gshadow
-    - audit_rules_usergroup_modification_group
-    - audit_rules_login_events_lastlog
+    # - audit_rules_usergroup_modification_shadow
+    # - audit_rules_usergroup_modification_opasswd
+    # - audit_rules_usergroup_modification_passwd
+    # - audit_rules_usergroup_modification_gshadow
+    # - audit_rules_usergroup_modification_group
+    # - audit_rules_login_events_lastlog
     - grub2_audit_argument
     - grub2_audit_backlog_limit_argument
     - configure_usbguard_auditbackend
@@ -326,7 +326,7 @@ selections:
     - no_empty_passwords
     - sshd_disable_empty_passwords
     - file_ownership_var_log_audit
-    - audit_rules_sysadmin_actions
+    # - audit_rules_sysadmin_actions
     - package_audit_installed
     - service_auditd_enabled
     - sshd_allow_only_protocol2
diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index 2c574382a8..58fc365707 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -60,13 +60,6 @@ selections:
 - aide_verify_acls
 - aide_verify_ext_attributes
 - audit_rules_immutable
-- audit_rules_login_events_lastlog
-- audit_rules_sysadmin_actions
-- audit_rules_usergroup_modification_group
-- audit_rules_usergroup_modification_gshadow
-- audit_rules_usergroup_modification_opasswd
-- audit_rules_usergroup_modification_passwd
-- audit_rules_usergroup_modification_shadow
 - auditd_data_disk_error_action
 - auditd_data_disk_full_action
 - auditd_data_retention_action_mail_acct

From 99cf1438cf9ac71af398b34247aec389b3163d7c Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 12 Feb 2021 09:57:35 +0100
Subject: [PATCH 18/21] Add missing SRG mapping for RHEL8 STIG profile rules.

---
 .../postfix_client_configure_mail_alias/rule.yml              | 1 +
 .../mount_option_nodev_remote_filesystems/rule.yml            | 1 +
 .../directory_permissions_var_log_audit/rule.yml              | 1 +
 .../auditd_data_disk_error_action/rule.yml                    | 1 +
 .../auditd_data_disk_full_action/rule.yml                     | 1 +
 .../auditd_data_retention_max_log_file_action/rule.yml        | 1 +
 .../guide/system/logging/service_rsyslog_enabled/rule.yml     | 1 +
 .../files/dir_perms_world_writable_root_owned/rule.yml        | 1 +
 .../files/dir_perms_world_writable_sticky_bits/rule.yml       | 4 +++-
 .../file_ownership_binary_dirs/rule.yml                       | 1 +
 .../file_ownership_library_dirs/rule.yml                      | 1 +
 .../file_permissions_binary_dirs/rule.yml                     | 1 +
 .../file_permissions_library_dirs/rule.yml                    | 1 +
 .../mount_option_nodev_removable_partitions/rule.yml          | 1 +
 .../mount_option_noexec_removable_partitions/rule.yml         | 1 +
 .../integrity/fips/sysctl_crypto_fips_enabled/rule.yml        | 1 +
 16 files changed, 18 insertions(+), 1 deletion(-)

diff --git a/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml b/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
index 96601ebb87..ea30438a5f 100644
--- a/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
+++ b/linux_os/guide/services/mail/postfix_client/postfix_client_configure_mail_alias/rule.yml
@@ -32,6 +32,7 @@ references:
     nist@sle12: AU-5(a),AU-5.1(ii)
     anssi: BP28(R49)
     stigid@rhel8: RHEL-08-030030
+    srg: SRG-OS-000046-GPOS-00022
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
index 9374bdc065..66f4558923 100644
--- a/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
+++ b/linux_os/guide/services/nfs_and_rpc/nfs_configuring_clients/mounting_remote_filesystems/mount_option_nodev_remote_filesystems/rule.yml
@@ -25,6 +25,7 @@ references:
     iso27001-2013: A.11.2.9,A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.8.2.1,A.8.2.2,A.8.2.3,A.8.3.1,A.8.3.3,A.9.1.2
     cis-csc: 11,13,14,3,8,9
     stigid@rhel8: RHEL-08-010640
+    srg: SRG-OS-000480-GPOS-00227
 
 ocil_clause: 'the setting does not show'
 
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
index b9ff8233bb..64c7927021 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
@@ -27,6 +27,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.16.1.4,A.16.1.5,A.16.1.7,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,13,14,15,16,18,19,3,4,5,6,7,8
     stigid@rhel8: RHEL-08-030120
+    srg: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029
 
 ocil_clause: 'any are more permissive'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
index d3646de8ff..8e6836ae2f 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_error_action/rule.yml
@@ -35,6 +35,7 @@ references:
     iso27001-2013: A.12.1.3,A.12.4.1,A.12.4.2,A.12.4.3,A.12.4.4,A.12.7.1,A.16.1.4,A.16.1.5,A.16.1.7,A.17.2.1
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
     stigid@rhel8: RHEL-08-030040
+    srg: SRG-OS-000047-GPOS-00023
 
 ocil_clause: 'the system is not configured to switch to single-user mode for corrective action'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
index d92afe34e8..6b7dddb0ee 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_disk_full_action/rule.yml
@@ -42,6 +42,7 @@ references:
     disa@sle12: CCI-000140
     nist@sle12: AU-5(b),AU-5.1(iv)
     stigid@rhel8: RHEL-08-030060
+    srg: SRG-OS-000047-GPOS-00023
 
 ocil_clause: 'the system is not configured to switch to single-user mode for corrective action'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
index 6a32a85fe5..07c21ca5ab 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action/rule.yml
@@ -45,6 +45,7 @@ references:
     cobit5: APO11.04,APO12.06,APO13.01,BAI03.05,BAI04.04,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
     stigid@rhel8: RHEL-08-030050
+    srg: SRG-OS-000047-GPOS-00023
 
 ocil_clause: 'the system has not been properly configured to rotate audit logs'
 
diff --git a/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml b/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
index 3ef70473de..a87d19fc10 100644
--- a/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
+++ b/linux_os/guide/system/logging/service_rsyslog_enabled/rule.yml
@@ -30,6 +30,7 @@ references:
     cis-csc: 1,12,13,14,15,16,2,3,5,6,7,8,9
     cis@ubuntu2004: 4.2.1.2
     stigid@rhel8: RHEL-08-010561
+    srg: SRG-OS-000480-GPOS-00227
 
 ocil: '{{{ ocil_service_enabled(service="rsyslog") }}}'
 
diff --git a/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml b/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
index 90011f5f92..02e9ce0100 100644
--- a/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
+++ b/linux_os/guide/system/permissions/files/dir_perms_world_writable_root_owned/rule.yml
@@ -25,6 +25,7 @@ identifiers:
 references:
     anssi: BP28(R40)
     stigid@rhel8: RHEL-08-010700
+    srg: SRG-OS-000480-GPOS-00227
 
 ocil_clause: 'there is output'
 
diff --git a/linux_os/guide/system/permissions/files/dir_perms_world_writable_sticky_bits/rule.yml b/linux_os/guide/system/permissions/files/dir_perms_world_writable_sticky_bits/rule.yml
index 5bb3cf3713..3c9e31b97e 100644
--- a/linux_os/guide/system/permissions/files/dir_perms_world_writable_sticky_bits/rule.yml
+++ b/linux_os/guide/system/permissions/files/dir_perms_world_writable_sticky_bits/rule.yml
@@ -47,7 +47,9 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     cis@sle15: 1.1.22
-    stigid@sle12: SLES-12-010460 
+    stigid@sle12: SLES-12-010460
+    stigid@rhel8: RHEL-08-010190
+    srg: SRG-OS-000138-GPOS-00069
 
 ocil_clause: 'any world-writable directories are missing the sticky bit'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
index fa53de9041..36943519fa 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_binary_dirs/rule.yml
@@ -37,6 +37,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@rhel8: RHEL-08-010310
+    srg: SRG-OS-000259-GPOS-00100
 
 ocil_clause: 'any system executables are found to not be owned by root'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
index e40b5f47d8..c39997169b 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_ownership_library_dirs/rule.yml
@@ -38,6 +38,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@rhel8: RHEL-08-010340
+    srg: SRG-OS-000259-GPOS-00100
 
 ocil_clause: 'any of these files are not owned by root'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
index 3ec56361dc..efe4a723d7 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_binary_dirs/rule.yml
@@ -37,6 +37,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@rhel8: RHEL-08-010300
+    srg: SRG-OS-000259-GPOS-00100
 
 ocil_clause: 'any system executables are found to be group or world writable'
 
diff --git a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
index 83add611b9..e3a067e0b8 100644
--- a/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
+++ b/linux_os/guide/system/permissions/files/permissions_within_important_dirs/file_permissions_library_dirs/rule.yml
@@ -38,6 +38,7 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 12,13,14,15,16,18,3,5
     stigid@rhel8: RHEL-08-010330
+    srg: SRG-OS-000259-GPOS-00100
 
 ocil_clause: 'any of these files are group-writable or world-writable'
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
index 602ce2da35..5912fb9d8c 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_nodev_removable_partitions/rule.yml
@@ -37,6 +37,7 @@ references:
     cis-csc: 11,12,13,14,16,3,8,9
     cis@sle15: 1.1.19
     stigid@rhel8: RHEL-08-010600
+    srg: SRG-OS-000480-GPOS-00227
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
index 4d2bd0eceb..6e17c9f514 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
@@ -35,6 +35,7 @@ references:
     cis-csc: 11,12,13,14,16,3,8,9
     cis@sle15: 1.1.20
     stigid@rhel8: RHEL-08-010610
+    srg: SRG-OS-000480-GPOS-00227
 
 ocil_clause: 'removable media partitions are present'
 
diff --git a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
index 8753e4aeef..129df45d54 100644
--- a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
@@ -30,6 +30,7 @@ references:
     nist: SC-12(2),SC-12(3),IA-7,SC-13,CM-6(a),SC-12
     vmmsrg: SRG-OS-000120-VMM-000600,SRG-OS-000478-VMM-001980,SRG-OS-000396-VMM-001590
     stigid@rhel8: RHEL-08-010020
+    srg: SRG-OS-000033-GPOS-00014,SRG-OS-000125-GPOS-00065,SRG-OS-000396-GPOS-00176,SRG-OS-000423-GPOS-00187,SRG-OS-000478-GPOS-00223
 
 ocil_clause: 'crypto.fips_enabled is not 1'
 

From 76f5b95600228ff64a8730155256e045124d0f58 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 12 Feb 2021 13:58:12 +0100
Subject: [PATCH 19/21] Update RHEL8 STIG profile stability test data.

---
 tests/data/profile_stability/rhel8/stig.profile | 1 -
 1 file changed, 1 deletion(-)

diff --git a/tests/data/profile_stability/rhel8/stig.profile b/tests/data/profile_stability/rhel8/stig.profile
index 58fc365707..55b645b67b 100644
--- a/tests/data/profile_stability/rhel8/stig.profile
+++ b/tests/data/profile_stability/rhel8/stig.profile
@@ -59,7 +59,6 @@ selections:
 - aide_scan_notification
 - aide_verify_acls
 - aide_verify_ext_attributes
-- audit_rules_immutable
 - auditd_data_disk_error_action
 - auditd_data_disk_full_action
 - auditd_data_retention_action_mail_acct

From e0765fb6c96510ac015388b94e82938370792e12 Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 12 Feb 2021 14:22:48 +0100
Subject: [PATCH 20/21] Fix RHEL8 STIG ID references.

---
 apple_os/auditing/service_auditd_enabled/rule.yml               | 1 -
 .../services/fapolicyd/package_fapolicyd_installed/rule.yml     | 1 -
 .../services/ssh/package_openssh-server_installed/rule.yml      | 1 -
 .../services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml     | 1 -
 .../guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml   | 1 -
 .../guide/services/usbguard/package_usbguard_installed/rule.yml | 1 -
 .../gui_login_banner/dconf_gnome_banner_enabled/rule.yml        | 1 -
 .../accounts_passwords_pam_faillock_deny_root/rule.yml          | 1 -
 .../accounts-physical/require_emergency_target_auth/rule.yml    | 1 -
 .../console_screen_locking/package_tmux_installed/rule.yml      | 1 -
 .../auditd_data_retention_space_left_action/rule.yml            | 2 --
 linux_os/guide/system/auditing/package_audit_installed/rule.yml | 1 -
 .../bootloader-grub2/non-uefi/grub2_admin_username/rule.yml     | 1 -
 .../bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml    | 1 -
 .../firewalld_activation/package_firewalld_installed/rule.yml   | 1 -
 .../sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml          | 1 -
 .../sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml           | 1 -
 .../sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml        | 1 -
 .../sysctl_net_ipv6_conf_all_accept_redirects/rule.yml          | 1 -
 .../sysctl_net_ipv6_conf_all_accept_source_route/rule.yml       | 1 -
 .../sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml      | 1 -
 .../sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml       | 1 -
 .../sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml    | 1 -
 .../sysctl_net_ipv6_conf_default_accept_redirects/rule.yml      | 1 -
 .../software/disk_partitioning/partition_for_var_log/rule.yml   | 1 -
 .../disk_partitioning/partition_for_var_log_audit/rule.yml      | 2 --
 .../software/disk_partitioning/partition_for_var_tmp/rule.yml   | 1 -
 .../certified-vendor/installed_OS_is_vendor_supported/rule.yml  | 1 -
 .../software/integrity/fips/grub2_enable_fips_mode/rule.yml     | 1 -
 .../software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml | 1 -
 .../software-integrity/aide/package_aide_installed/rule.yml     | 1 -
 .../system-tools/package_abrt-addon-ccpp_removed/rule.yml       | 1 -
 .../system-tools/package_abrt-addon-kerneloops_removed/rule.yml | 1 -
 .../system-tools/package_abrt-addon-python_removed/rule.yml     | 1 -
 .../software/system-tools/package_abrt-cli_removed/rule.yml     | 1 -
 .../system-tools/package_abrt-plugin-logger_removed/rule.yml    | 1 -
 .../package_abrt-plugin-rhtsupport_removed/rule.yml             | 1 -
 .../system-tools/package_abrt-plugin-sosreport_removed/rule.yml | 1 -
 38 files changed, 40 deletions(-)

diff --git a/apple_os/auditing/service_auditd_enabled/rule.yml b/apple_os/auditing/service_auditd_enabled/rule.yml
index 0c34cae438..bbb5132b5f 100644
--- a/apple_os/auditing/service_auditd_enabled/rule.yml
+++ b/apple_os/auditing/service_auditd_enabled/rule.yml
@@ -35,7 +35,6 @@ references:
     nist: AU-3,AU-3(1),AU-8(a),AU-8(b),AU-12(3),AU-14(1)
     srg: SRG-OS-000037-GPOS-00015,SRG-OS-000038-GPOS-00016,SRG-OS-000039-GPOS-00017,SRG-OS-000040-GPOS-00018,SRG-OS-000041-GPOS-00019,SRG-OS-000042-GPOS-00020,SRG-OS-000042-GPOS-00021,SRG-OS-000055-GPOS-00026,SRG-OS-000254-GPOS-00095,SRG-OS-000255-GPOS-00096,SRG-OS-000303-GPOS-00120,SRG-OS-000337-GPOS-00129,SRG-OS-000358-GPOS-00145,SRG-OS-000359-GPOS-00146
     stigid: AOSX-14-001013
-    stigid@rhel8: RHEL-08-010560
 
 ocil_clause: 'auditing is not enabled or running'
 
diff --git a/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml b/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
index a35cb48f83..5869cac7ab 100644
--- a/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
+++ b/linux_os/guide/services/fapolicyd/package_fapolicyd_installed/rule.yml
@@ -20,7 +20,6 @@ identifiers:
 references:
     nist: CM-6(a),SI-4(22)
     srg: SRG-OS-000370-GPOS-00155
-    stigid@rhel8: RHEL-08-040135
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
index 4fda79df25..84882d52b3 100644
--- a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
+++ b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
@@ -31,7 +31,6 @@ references:
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 13,14
     ospp: FIA_UAU.5,FTP_ITC_EXT.1
-    stigid@rhel8: RHEL-08-040160
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
index 50eb7a28cb..1f1380127c 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_disable_kerb_auth/rule.yml
@@ -37,7 +37,6 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4
     cis-csc: 11,3,9
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
-    stigid@rhel8: RHEL-08-010521
 
 ocil_clause: 'it is commented out or is not disabled'
 
diff --git a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
index 8987c9b9ed..c43fce001a 100644
--- a/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
+++ b/linux_os/guide/services/ssh/ssh_server/sshd_set_keepalive/rule.yml
@@ -47,7 +47,6 @@ references:
     cobit5: APO13.01,BAI03.01,BAI03.02,BAI03.03,DSS01.03,DSS03.05,DSS05.04,DSS05.05,DSS05.07,DSS05.10,DSS06.03,DSS06.10
     iso27001-2013: A.12.4.1,A.12.4.3,A.14.1.1,A.14.2.1,A.14.2.5,A.18.1.4,A.6.1.2,A.6.1.5,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,3,5,7,8
-    stigid@rhel8: RHEL-08-010200
 
 requires:
     - sshd_set_idle_timeout
diff --git a/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml b/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
index 6806e0861d..f23176d83e 100644
--- a/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
+++ b/linux_os/guide/services/usbguard/package_usbguard_installed/rule.yml
@@ -22,7 +22,6 @@ identifiers:
 references:
     srg: SRG-OS-000378-GPOS-00163
     ism: "1418"
-    stigid@rhel8: RHEL-08-040140
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
index c364bdb9e1..47c4edad90 100644
--- a/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-banners/gui_login_banner/dconf_gnome_banner_enabled/rule.yml
@@ -49,7 +49,6 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
-    stigid@rhel8: RHEL-08-010050
 
 ocil_clause: 'it is not'
 
diff --git a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
index 4b7ee01946..fb7a2d37ae 100644
--- a/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml
@@ -44,7 +44,6 @@ references:
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
-    stigid@rhel8: RHEL-08-020010
     stigid@rhel8: RHEL-08-020022
 
 ocil_clause: 'that is not the case'
diff --git a/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml b/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
index 2e902739ae..f9959f0720 100644
--- a/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/require_emergency_target_auth/rule.yml
@@ -42,7 +42,6 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     ism: 0421,0422,0431,0974,1173,1401,1504,1505,1546,1557,1558,1559,1560,1561
-    stigid@rhel8: RHEL-08-010151
 
 ocil_clause: 'the output is different'
 
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
index d57802a37e..c900612b1b 100644
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/console_screen_locking/package_tmux_installed/rule.yml
@@ -40,7 +40,6 @@ references:
     cobit5: DSS05.04,DSS05.10,DSS06.10
     iso27001-2013: A.18.1.4,A.9.2.1,A.9.2.4,A.9.3.1,A.9.4.2,A.9.4.3
     cis-csc: 1,12,15,16
-    stigid@rhel8: RHEL-08-020040
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
index 1009699e77..bdc86cf35b 100644
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/rule.yml
@@ -51,8 +51,6 @@ references:
     isa-62443-2009: 4.2.3.10,4.3.3.3.9,4.3.3.5.8,4.3.4.4.7,4.3.4.5.6,4.3.4.5.7,4.3.4.5.8,4.4.2.1,4.4.2.2,4.4.2.4
     cobit5: APO11.04,APO12.06,APO13.01,BAI03.05,BAI04.04,BAI08.02,DSS02.02,DSS02.04,DSS02.07,DSS03.01,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8
-    stigid@rhel8: RHEL-08-030730
-    stigid@rhel8: RHEL-08-030730
 
 ocil_clause: 'the system is not configured to send an email to the system administrator when disk space is starting to run low'
 
diff --git a/linux_os/guide/system/auditing/package_audit_installed/rule.yml b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
index 577176ff00..2fc431c1ae 100644
--- a/linux_os/guide/system/auditing/package_audit_installed/rule.yml
+++ b/linux_os/guide/system/auditing/package_audit_installed/rule.yml
@@ -26,7 +26,6 @@ references:
     srg@sle12: SRG-OS-000337-GPOS-00129,SRG-OS-000348-GPOS-00136,SRG-OS-000349-GPOS-00137,SRG-OS-000350-GPOS-00138,SRG-OS-000351-GPOS-00139,SRG-OS-000352-GPOS-00140,SRG-OS-000353-GPOS-00141,SRG-OS-000354-GPOS-00142,SRG-OS-000358-GPOS-00145,SRG-OS-000359-GPOS-00146,SRG-OS-000365-GPOS-00152,SRG-OS-000474-GPOS-00219,SRG-OS-000475-GPOS-00220
     disa@sle12: CCI-000172,CCI-001814,CCI-001875,CCI-001877,CCI-001878,CCI-001879,CCI-001880,CCI-001881,CCI-001882,CCI-001889,CCI-001914
     nist@sle12: AU-7(a),AU-7(b),AU-8(b),AU-12.1(iv),AU-12(3),AU-12(c),CM-5(1)
-    stigid@rhel8:  service_auditd_enabled
 
 template:
     name: package_installed
diff --git a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
index 0690cfbcda..4b04936ee2 100644
--- a/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/non-uefi/grub2_admin_username/rule.yml
@@ -49,7 +49,6 @@ references:
     iso27001-2013: A.18.1.4,A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.2,A.9.2.3,A.9.2.4,A.9.2.6,A.9.3.1,A.9.4.1,A.9.4.2,A.9.4.3,A.9.4.4,A.9.4.5
     cis-csc: 1,11,12,14,15,16,18,3,5
     anssi: BP28(R17)
-    stigid@rhel8: RHEL-08-010150
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
index 08e1da4369..ea5c80f163 100644
--- a/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
+++ b/linux_os/guide/system/bootloader-grub2/uefi/grub2_uefi_admin_username/rule.yml
@@ -56,7 +56,6 @@ references:
     iso27001-2013: A.6.1.2,A.7.1.1,A.9.1.2,A.9.2.1,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 11,12,14,15,16,18,3,5
     anssi: BP28(R17)
-    stigid@rhel8: RHEL-08-010140
 
 ocil_clause: 'it does not'
 
diff --git a/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml b/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
index e82f50f9a0..7aea04c670 100644
--- a/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
+++ b/linux_os/guide/system/network/network-firewalld/firewalld_activation/package_firewalld_installed/rule.yml
@@ -20,7 +20,6 @@ references:
     nist: CM-6(a)
     srg: SRG-OS-000480-GPOS-00227,SRG-OS-000298-GPOS-00116
     cis@rhel8: 3.4.1.1
-    stigid@rhel8: RHEL-08-040100
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
index 04fa55f524..5b5bfc9633 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_defrtr/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_defrtr", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
index 304c549b0b..d75989fca1 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_pinfo/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_pinfo", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
index d3b8347573..09d263cf00 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra_rtr_pref/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040261
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_ra_rtr_pref", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
index ae67ab248d..9253f7235a 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_redirects/rule.yml
@@ -28,7 +28,6 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
-    stigid@rhel8: RHEL-08-040280
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
index ac9218fe34..8767a5226f 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_source_route/rule.yml
@@ -40,7 +40,6 @@ references:
     cobit5: APO01.06,APO13.01,DSS01.05,DSS03.01,DSS05.02,DSS05.04,DSS05.07,DSS06.02
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.12.1.1,A.12.1.2,A.13.1.1,A.13.1.2,A.13.1.3,A.13.2.1,A.13.2.2,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
     cis-csc: 1,12,13,14,15,16,18,4,6,8,9
-    stigid@rhel8: RHEL-08-040240
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_source_route", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
index eca95f75b5..5cf98305c7 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_defrtr/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_defrtr", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
index f030cd9221..d7dad19f3a 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_pinfo/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_pinfo", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
index 43c901e3a4..b6ee061057 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra_rtr_pref/rule.yml
@@ -16,7 +16,6 @@ identifiers:
 
 references:
     anssi: BP28(R22)
-    stigid@rhel8: RHEL-08-040262
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_ra_rtr_pref", value="0") }}}
 
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
index fdd8572cf5..970db38b33 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_redirects/rule.yml
@@ -28,7 +28,6 @@ references:
     iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
     cis-csc: 11,14,3,9
     srg: SRG-OS-000480-GPOS-00227
-    stigid@rhel8: RHEL-08-040210
 
 {{{ complete_ocil_entry_sysctl_option_value(sysctl="net.ipv6.conf.default.accept_redirects", value="0") }}}
 
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
index b90f93deee..77ea8196c1 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log/rule.yml
@@ -33,7 +33,6 @@ references:
     cis-csc: 1,12,14,15,16,3,5,6,8
     srg: SRG-OS-000480-GPOS-00227
     cis@sle: 1.1.12
-    stigid@rhel8: RHEL-08-010540
     stigid@rhel8: RHEL-08-010541
 
 {{{ complete_ocil_entry_separate_partition(part="/var/log") }}}
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
index 73b5cd50ed..3ff8be67b5 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_log_audit/rule.yml
@@ -40,8 +40,6 @@ references:
     cobit5: APO11.04,APO13.01,BAI03.05,BAI04.04,DSS05.02,DSS05.04,DSS05.07,MEA02.01
     cis-csc: 1,12,13,14,15,16,2,3,5,6,8
     cis@sle15: 1.1.13
-    stigid@rhel8: RHEL-08-010540
-    stigid@rhel8: RHEL-08-010541
     stigid@rhel8: RHEL-08-010542
 
 {{{ complete_ocil_entry_separate_partition(part="/var/log/audit") }}}
diff --git a/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml b/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
index fde3338f40..340af24c82 100644
--- a/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
+++ b/linux_os/guide/system/software/disk_partitioning/partition_for_var_tmp/rule.yml
@@ -26,7 +26,6 @@ references:
     cis@ubuntu1804: 1.1.6
     anssi: BP28(R12)
     cis@sle15: 1.1.8
-    stigid@rhel8: RHEL-08-010540
 
 {{{ complete_ocil_entry_separate_partition(part="/var/tmp") }}}
 
diff --git a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
index d9eb1b8a61..fba676f0b9 100644
--- a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
+++ b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
@@ -48,7 +48,6 @@ references:
     cobit5: APO12.01,APO12.02,APO12.03,APO12.04,BAI03.10,DSS05.01,DSS05.02
     iso27001-2013: A.12.6.1,A.14.2.3,A.16.1.3,A.18.2.2,A.18.2.3
     cis-csc: 18,20,4
-    stigid@rhel8: RHEL-08-010000
 
 ocil_clause: 'the installed operating system is not supported'
 
diff --git a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
index 5879bc2bdb..77c78d5705 100644
--- a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode/rule.yml
@@ -47,7 +47,6 @@ references:
     cobit5: APO13.01,DSS01.04,DSS05.02,DSS05.03
     iso27001-2013: A.11.2.6,A.13.1.1,A.13.2.1,A.14.1.3,A.6.2.1,A.6.2.2
     cis-csc: 12,15,8
-    stigid@rhel8: RHEL-08-010020
 
 ocil_clause: 'FIPS is not configured or enabled in grub'
 
diff --git a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
index 129df45d54..b439a0305f 100644
--- a/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
+++ b/linux_os/guide/system/software/integrity/fips/sysctl_crypto_fips_enabled/rule.yml
@@ -29,7 +29,6 @@ references:
     disa: CCI-000068,CCI-000803,CCI-002450
     nist: SC-12(2),SC-12(3),IA-7,SC-13,CM-6(a),SC-12
     vmmsrg: SRG-OS-000120-VMM-000600,SRG-OS-000478-VMM-001980,SRG-OS-000396-VMM-001590
-    stigid@rhel8: RHEL-08-010020
     srg: SRG-OS-000033-GPOS-00014,SRG-OS-000125-GPOS-00065,SRG-OS-000396-GPOS-00176,SRG-OS-000423-GPOS-00187,SRG-OS-000478-GPOS-00223
 
 ocil_clause: 'crypto.fips_enabled is not 1'
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
index 1667604386..abf13a274a 100644
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/package_aide_installed/rule.yml
@@ -33,7 +33,6 @@ references:
     ism: 1034,1288,1341,1417
     stigid@sle12: SLES-12-010500
     disa@sle12: CCI-002699
-    stigid@rhel8: RHEL-08-010360
 
 ocil_clause: 'the package is not installed'
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
index 5482cdf3af..ed2fc64d08 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-ccpp_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-ccpp") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
index 3b12bfb5b0..8bbf9ea53d 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-kerneloops_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-kerneloops") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
index 00b1a36714..9be8b08b0f 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-addon-python_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-addon-python") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
index 0412e8b82b..9aa7f11ada 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-cli_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-cli") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
index 9d10076523..d970def693 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-logger_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-logger") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
index addb652e92..7f7787a19a 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-rhtsupport_removed/rule.yml
@@ -19,7 +19,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-rhtsupport") }}}
 
diff --git a/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml b/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
index 6647186cc7..6107659d94 100644
--- a/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
+++ b/linux_os/guide/system/software/system-tools/package_abrt-plugin-sosreport_removed/rule.yml
@@ -18,7 +18,6 @@ identifiers:
 
 references:
     srg: SRG-OS-000095-GPOS-00049
-    stigid@rhel8: RHEL-08-040001
 
 {{{ complete_ocil_entry_package(package="abrt-plugin-sosreport") }}}
 

From 7724efd079c177adaa3ab70056b57f57b9424e9f Mon Sep 17 00:00:00 2001
From: Gabriel Becker <ggasparb@redhat.com>
Date: Fri, 12 Feb 2021 16:26:49 +0100
Subject: [PATCH 21/21] Add severity according RHEL8 STIG for rules that had
 unknown severity.

---
 linux_os/guide/services/ntp/chronyd_client_only/rule.yml        | 2 +-
 linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml | 2 +-
 .../account_expiration/account_temp_expire_date/rule.yml        | 2 +-
 .../user_umask/accounts_umask_etc_bashrc/rule.yml               | 2 +-
 .../directory_permissions_var_log_audit/rule.yml                | 2 +-
 .../sysctl_net_ipv6_conf_all_accept_ra/rule.yml                 | 2 +-
 .../sysctl_net_ipv6_conf_default_accept_ra/rule.yml             | 2 +-
 .../permissions/files/sysctl_fs_protected_hardlinks/rule.yml    | 2 +-
 .../permissions/files/sysctl_fs_protected_symlinks/rule.yml     | 2 +-
 .../mount_option_nodev_nonroot_local_partitions/rule.yml        | 2 +-
 .../mount_option_noexec_removable_partitions/rule.yml           | 2 +-
 .../permissions/partitions/mount_option_tmp_nodev/rule.yml      | 2 +-
 .../permissions/partitions/mount_option_tmp_noexec/rule.yml     | 2 +-
 .../permissions/partitions/mount_option_tmp_nosuid/rule.yml     | 2 +-
 .../permissions/partitions/mount_option_var_tmp_nodev/rule.yml  | 2 +-
 .../permissions/partitions/mount_option_var_tmp_noexec/rule.yml | 2 +-
 .../permissions/partitions/mount_option_var_tmp_nosuid/rule.yml | 2 +-
 .../restrictions/coredumps/coredump_disable_backtraces/rule.yml | 2 +-
 .../restrictions/coredumps/coredump_disable_storage/rule.yml    | 2 +-
 .../restrictions/coredumps/disable_users_coredumps/rule.yml     | 2 +-
 .../coredumps/service_systemd-coredump_disabled/rule.yml        | 2 +-
 .../restrictions/sysctl_kernel_core_pattern/rule.yml            | 2 +-
 22 files changed, 22 insertions(+), 22 deletions(-)

diff --git a/linux_os/guide/services/ntp/chronyd_client_only/rule.yml b/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
index 071934387c..83d1ba0df1 100644
--- a/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_client_only/rule.yml
@@ -13,7 +13,7 @@ rationale: |-
     Minimizing the exposure of the server functionality of the chrony
     daemon diminishes the attack surface.
 
-severity: unknown
+severity: low
 
 platform: machine  # The check uses service_... extended definition, which doesnt support offline mode
 
diff --git a/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml b/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
index cbc9cc670c..d6d776a9a3 100644
--- a/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
+++ b/linux_os/guide/services/ntp/chronyd_no_chronyc_network/rule.yml
@@ -13,7 +13,7 @@ rationale: |-
     Not exposing the management interface of the chrony daemon on
     the network diminishes the attack space.
 
-severity: unknown
+severity: low
 
 platform: machine  # The check uses service_... extended definition, which doesnt support offline mode
 
diff --git a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
index ced7a52a67..c3a2a13bed 100644
--- a/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-restrictions/account_expiration/account_temp_expire_date/rule.yml
@@ -25,7 +25,7 @@ rationale: |-
     must be set upon account creation.
     <br />
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-81000-2
diff --git a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
index 1c8219de70..e06ae36196 100644
--- a/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
+++ b/linux_os/guide/system/accounts/accounts-session/user_umask/accounts_umask_etc_bashrc/rule.yml
@@ -15,7 +15,7 @@ rationale: |-
     A misconfigured umask value could result in files with excessive permissions that can be read or
     written to by unauthorized users.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80202-5
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
index 64c7927021..65dc7861ce 100644
--- a/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/directory_permissions_var_log_audit/rule.yml
@@ -12,7 +12,7 @@ description: |-
 
 rationale: 'If users can write to audit logs, audit trails can be modified or destroyed.'
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhcos4: CCE-82692-5
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
index 8e7eabc336..0b38e2f414 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_all_accept_ra/rule.yml
@@ -8,7 +8,7 @@ description: '{{{ describe_sysctl_option_value(sysctl="net.ipv6.conf.all.accept_
 
 rationale: 'An illicit router advertisement message could result in a man-in-the-middle attack.'
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80180-3
diff --git a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
index dcf480ef63..167fb59f48 100644
--- a/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
+++ b/linux_os/guide/system/network/network-ipv6/configuring_ipv6/sysctl_net_ipv6_conf_default_accept_ra/rule.yml
@@ -8,7 +8,7 @@ description: '{{{ describe_sysctl_option_value(sysctl="net.ipv6.conf.default.acc
 
 rationale: 'An illicit router advertisement message could result in a man-in-the-middle attack.'
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80181-1
diff --git a/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml b/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
index 0aefe8ae50..9874bb19dc 100644
--- a/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
+++ b/linux_os/guide/system/permissions/files/sysctl_fs_protected_hardlinks/rule.yml
@@ -10,7 +10,7 @@ rationale: |-
     based on insecure file system accessed by privileged programs, avoiding an
     exploitation vector exploiting unsafe use of <tt>open()</tt> or <tt>creat()</tt>.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-81026-7
diff --git a/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml b/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
index 86a9f8e2d9..655283997a 100644
--- a/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
+++ b/linux_os/guide/system/permissions/files/sysctl_fs_protected_symlinks/rule.yml
@@ -12,7 +12,7 @@ rationale: |-
     accessed by privileged programs, avoiding an exploitation vector exploiting unsafe use of
     <tt>open()</tt> or <tt>creat()</tt>.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-81029-1
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
index f40daec6c8..f7c3502b00 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_nodev_nonroot_local_partitions/rule.yml
@@ -25,7 +25,7 @@ ocil: |
 
 ocil_clause: "some mounts appear among output lines"
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80145-6
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
index 6e17c9f514..d329ad2962 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_noexec_removable_partitions/rule.yml
@@ -15,7 +15,7 @@ rationale: |-
     Allowing users to execute binaries from removable media such as USB keys exposes
     the system to potential compromise.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80147-2
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
index ed27226855..35173f9e61 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nodev/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/tmp", "nodev") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80149-8
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
index 77ae8a664f..4f831bdacb 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_noexec/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/tmp", "noexec") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80150-6
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
index b7e171fb02..5bcbebdfda 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_tmp_nosuid/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/tmp", "nosuid") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80151-4
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
index 4e76e61bb2..136ba137a2 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nodev/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/var/tmp", "nodev") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-81052-3
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
index f2b108d58d..8eb0eafc72 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_noexec/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/var/tmp", "noexec") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-82150-4
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
index 11bfe2661d..90c578791c 100644
--- a/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
+++ b/linux_os/guide/system/permissions/partitions/mount_option_var_tmp_nosuid/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
 
 {{{ complete_ocil_entry_mount_option("/var/tmp", "nosuid") }}}
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-82153-8
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
index 04b580e64e..79af205224 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_backtraces/rule.yml
@@ -20,7 +20,7 @@ rationale: |-
     debuging. Permitting temporary enablement of core dumps during such situations
     should be reviewed through local needs and policy.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel8: CCE-82251-0
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
index 3225785a8f..9fdb4d8fd1 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/coredump_disable_storage/rule.yml
@@ -16,7 +16,7 @@ rationale: |-
     debuging. Permitting temporary enablement of core dumps during such situations
     should be reviewed through local needs and policy. 
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel8: CCE-82252-8
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
index c50a366512..991c92dd0a 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/disable_users_coredumps/rule.yml
@@ -15,7 +15,7 @@ rationale: |-
     terminates an application. The memory image could contain sensitive data and is generally useful
     only for developers trying to debug problems.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel7: CCE-80169-6
diff --git a/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml b/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
index fd12fbbb50..125e764b3a 100644
--- a/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/coredumps/service_systemd-coredump_disabled/rule.yml
@@ -14,7 +14,7 @@ rationale: |-
     terminates an application. The memory image could contain sensitive data
     and is generally useful only for developers trying to debug problems.
 
-severity: unknown
+severity: medium
 
 platform: machine
 
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
index b82e0fcce3..60e5048462 100644
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_core_pattern/rule.yml
@@ -11,7 +11,7 @@ rationale: |-
     terminates an application. The memory image could contain sensitive data and is generally useful
     only for developers trying to debug problems.
 
-severity: unknown
+severity: medium
 
 identifiers:
     cce@rhel8: CCE-82215-5