File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (40 lines) | stat: -rw-r--r-- 1,220 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
documentation_complete: true


title: 'The PAM configuration should not be changed automatically'

description: |-
    Verify the SUSE operating system is configured to not overwrite Pluggable
    Authentication Modules (PAM) configuration on package changes.


rationale: |-
    <tt>pam-config</tt> is a command line utility that automatically generates
    a system PAM configuration as packages are installed, updated or removed
    from the system. <tt>pam-config</tt> removes configurations for PAM modules
    and parameters that it does not know about. It may render ineffective PAM
    configuration by the system administrator and thus impact system security.

severity: medium

identifiers:
    cce@sle12: CCE-83113-1
    cce@sle15: CCE-85641-9
    cce@slmicro5: CCE-93750-8

references:
    nist@sle12: CM-6(b),CM-6.1(iv)
    srg: SRG-OS-000480-GPOS-00227
    stigid@sle12: SLES-12-010910
    stigid@sle15: SLES-15-040220

ocil_clause: 'there is output'

ocil: |-
    Check that soft links between PAM configuration files are removed with the following command:

    <pre># find /etc/pam.d/ -type l -iname "common-*"</pre>

    If any results are returned, this is a finding.

platform: package[pam_apparmor]