File: runtime_kernel_fips_enabled.xml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (30 lines) | stat: -rw-r--r-- 1,237 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
<def-group>
  <definition class="inventory" id="runtime_kernel_fips_enabled" version="1">
    <metadata>
      <title>Running kernel has fips mode enabled</title>
      <affected family="unix">
        <platform>multi_platform_all</platform>
      </affected>
      <description>Check if sysctl crypto.fips_enabled = 1</description>
      <reference ref_id="cpe:/a:runtime-kernel-fips-enabled" source="CPE" />
    </metadata>
    <criteria>
      <criterion test_ref="test_runtime_kernel_fips_enabled" comment="check if sysctl crypto.fips_enabled = 1" />
    </criteria>
  </definition>

  <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter crypto.fips_enabled set to 1"
  id="test_runtime_kernel_fips_enabled" version="1">
    <unix:object object_ref="obj_runtime_kernel_fips_enabled" />
    <unix:state state_ref="state_runtime_kernel_fips_enabled" />
  </unix:sysctl_test>

  <unix:sysctl_object id="obj_runtime_kernel_fips_enabled" version="1">
    <unix:name>crypto.fips_enabled</unix:name>
  </unix:sysctl_object>

  <unix:sysctl_state id="state_runtime_kernel_fips_enabled" version="1">
    <unix:value datatype="int" operation="equals">1</unix:value>
  </unix:sysctl_state>

</def-group>