From: David Smith <dsmith(a)eclipse.ncsc.mil>
---
.../accounts_password_pam_cracklib_dcredit.xml | 1 +
.../accounts_password_pam_cracklib_difok.xml | 1 +
.../accounts_password_pam_cracklib_lcredit.xml | 1 +
.../accounts_password_pam_cracklib_ocredit.xml | 1 +
.../accounts_password_pam_cracklib_ucredit.xml | 1 +
.../checks/audit_rules_file_deletion_events.xml | 1 +
RHEL6/input/checks/audit_rules_media_export.xml | 1 +
.../input/checks/audit_rules_sysadmin_actions.xml | 1 +
RHEL6/input/checks/audit_rules_time_adjtimex.xml | 1 +
.../audit_rules_unsuccessful_file_modification.xml | 1 +
10 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml
index 182313a..b0e13f4 100644
--- a/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml
+++ b/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml
@@ -7,6 +7,7 @@
</affected>
<description>The password dcredit should meet minimum
requirements using pam_cracklib</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="Conditions for dcredit are satisfied"
diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml
index 37945cd..2aad2de 100644
--- a/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml
+++ b/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml
@@ -7,6 +7,7 @@
</affected>
<description>The password difok should meet minimum
requirements using pam_cracklib</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="Conditions for difok are satisfied"
diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml
index f9c42f0..a4f35f0 100644
--- a/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml
+++ b/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml
@@ -7,6 +7,7 @@
</affected>
<description>The password lcredit should meet minimum
requirements using pam_cracklib</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="Conditions for lcredit are satisfied"
diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml
index 8d433f4..39d106f 100644
--- a/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml
+++ b/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml
@@ -7,6 +7,7 @@
</affected>
<description>The password ocredit should meet minimum
requirements using pam_cracklib</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="Conditions for ocredit are satisfied"
diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml
index 9227167..0e2c478 100644
--- a/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml
+++ b/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml
@@ -7,6 +7,7 @@
</affected>
<description>The password ucredit should meet minimum
requirements using pam_cracklib</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="Conditions for ucredit are satisfied"
diff --git a/RHEL6/input/checks/audit_rules_file_deletion_events.xml b/RHEL6/input/checks/audit_rules_file_deletion_events.xml
index 9995642..d93d4d2 100644
--- a/RHEL6/input/checks/audit_rules_file_deletion_events.xml
+++ b/RHEL6/input/checks/audit_rules_file_deletion_events.xml
@@ -6,6 +6,7 @@
<platform>Red Hat Enterprise Linux 6</platform>
</affected>
<description>Audit files deletion events.</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="audit file delete" test_ref="test_audit_rules_file_deletion_events" />
diff --git a/RHEL6/input/checks/audit_rules_media_export.xml b/RHEL6/input/checks/audit_rules_media_export.xml
index 7019700..5adbfd2 100644
--- a/RHEL6/input/checks/audit_rules_media_export.xml
+++ b/RHEL6/input/checks/audit_rules_media_export.xml
@@ -6,6 +6,7 @@
<platform>Red Hat Enterprise Linux 6</platform>
</affected>
<description>Audit rules that detect the mounting of filesystems should be enabled.</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="audit mount" test_ref="test_audit_rules_media_export" />
diff --git a/RHEL6/input/checks/audit_rules_sysadmin_actions.xml b/RHEL6/input/checks/audit_rules_sysadmin_actions.xml
index 485f12e..081eedf 100644
--- a/RHEL6/input/checks/audit_rules_sysadmin_actions.xml
+++ b/RHEL6/input/checks/audit_rules_sysadmin_actions.xml
@@ -6,6 +6,7 @@
<platform>Red Hat Enterprise Linux 6</platform>
</affected>
<description>Audit actions taken by system administrators on the system.</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria>
<criterion comment="audit sudoers" test_ref="test_audit_rules_sysadmin_actions" />
diff --git a/RHEL6/input/checks/audit_rules_time_adjtimex.xml b/RHEL6/input/checks/audit_rules_time_adjtimex.xml
index bbafe7f..ca3b631 100644
--- a/RHEL6/input/checks/audit_rules_time_adjtimex.xml
+++ b/RHEL6/input/checks/audit_rules_time_adjtimex.xml
@@ -8,6 +8,7 @@
</affected>
<description>Record attempts to alter time through adjtimex.
</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria comment="Test for either..." operator="OR">
<criteria comment="both..." operator="AND">
diff --git a/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml b/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml
index 424462b..c2305f3 100644
--- a/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml
+++ b/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml
@@ -8,6 +8,7 @@
</affected>
<description>Audit rules about the Unauthorized Access
Attempts to Files (unsuccessful) are enabled</description>
+ <reference source="DS" ref_id="20131011" ref_url="test_attestation" />
</metadata>
<criteria operator="AND">
<criterion comment="audit file eacces" test_ref="test_audit_rules_unsuccessful_file_modification_eacces" />
--
1.7.1