2022-01-07 09:06:18 +00:00
---
2023-01-13 10:04:33 +00:00
- name : "6.2.1 | AUDIT | Ensure accounts in /etc/passwd use shadowed passwords"
block :
- name : "6.2.1 | AUDIT | Ensure accounts in /etc/passwd use shadowed passwords | discover"
ansible.builtin.shell : awk -F':' '($2 != "x" ) { print $1 " is not set to shadowed passwords "}' /etc/passwd
2023-01-20 13:36:34 +00:00
changed_when : false
2023-01-13 10:04:33 +00:00
register : shadow_passwd
- name : "6.2.1 | AUDIT | Ensure accounts in /etc/passwd use shadowed passwords | Output"
ansible.builtin.debug :
msg : |
- "Warning!! Below are the accounts that do not have shadowed passwords set"
- "{{ shadow_passwd.stdout_line }}"
when : shadow_passwd.stdout | length > 0
- name : "6.2.1 | AUDIT | Ensure accounts in /etc/passwd use shadowed passwords | warning fact"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
vars :
warn_control_id : '6.2.1'
when : shadow_passwd.stdout | length >= 1
when :
- rhel9cis_rule_6_2_1
tags :
- level1-server
- level1-workstation
- patch
- accounts
- rule_6.2.1
- name : "6.2.2 | PATCH | Ensure password fields are not empty"
ansible.builtin.shell : passwd -l {{ item }}
2022-01-07 09:06:18 +00:00
changed_when : false
failed_when : false
2023-01-25 09:47:26 +00:00
loop : "{{ empty_password_accounts.stdout_lines }}"
2022-01-07 09:06:18 +00:00
when :
- empty_password_accounts.rc
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_2
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- accounts
2023-01-13 10:04:33 +00:00
- rule_6.2.2
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.3 | AUDIT | Ensure all groups in /etc/passwd exist in /etc/group"
2022-03-30 16:18:11 +01:00
block :
2023-01-13 10:04:33 +00:00
- name : "6.2.3 | AUDIT | Ensure all groups in /etc/passwd exist in /etc/group | Check /etc/passwd entries"
ansible.builtin.shell : pwck -r | grep 'no group' | awk '{ gsub("[:\47]",""); print $2}'
2022-03-30 16:18:11 +01:00
changed_when : false
failed_when : false
check_mode : false
2023-01-13 10:04:33 +00:00
register : rhel9cis_6_2_3_passwd_gid_check
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.3 | AUDIT | Ensure all groups in /etc/passwd exist in /etc/group | Print warning about users with invalid GIDs missing GID entries in /etc/group"
ansible.builtin.debug :
2023-01-24 11:02:32 +00:00
msg : "Warning!! The following users have non-existent GIDs (Groups): {{ rhel9cis_6_2_3_passwd_gid_check.stdout_lines | join (', ') }}"
2023-01-13 10:04:33 +00:00
when : rhel9cis_6_2_3_passwd_gid_check.stdout | length >= 1
2022-07-20 17:13:33 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.3 | AUDIT | Ensure all groups in /etc/passwd exist in /etc/group | warning count"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
vars :
warn_control_id : '6.2.3'
when : rhel9cis_6_2_3_passwd_gid_check.stdout | length >= 1
2022-01-07 09:06:18 +00:00
when :
2023-01-24 11:02:32 +00:00
- rhel9cis_rule_6_2_3
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
2022-03-30 16:18:11 +01:00
- audit
- accounts
- groups
2024-01-03 11:20:08 +01:00
- rule_6.2.3
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.4 | AUDIT Ensure no duplicate UIDs exist"
2022-01-07 09:06:18 +00:00
block :
2023-01-13 10:04:33 +00:00
- name : "6.2.4 | AUDIT | Ensure no duplicate UIDs exist | Check for duplicate UIDs"
ansible.builtin.shell : "pwck -r | awk -F: '{if ($3 in uid) print $1 ; else uid[$3]}' /etc/passwd"
2022-03-30 16:18:11 +01:00
changed_when : false
failed_when : false
2023-01-13 10:04:33 +00:00
register : rhel9cis_6_2_4_user_uid_check
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.4 | AUDIT | Ensure no duplicate UIDs exist | Print warning about users with duplicate UIDs"
ansible.builtin.debug :
msg : "Warning!! The following users have UIDs that are duplicates: {{ rhel9cis_6_2_4_user_uid_check.stdout_lines }}"
when : rhel9cis_6_2_4_user_uid_check.stdout | length >= 1
- name : "6.2.4 | AUDIT| Ensure no duplicate UIDs exist | warning count"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
when : rhel9cis_6_2_4_user_uid_check.stdout | length >= 1
2023-01-13 11:05:25 +00:00
vars :
warn_control_id : '6.2.4'
2022-01-07 09:06:18 +00:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_4
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
2022-03-30 16:18:11 +01:00
- audit
- accounts
- users
2023-01-13 10:04:33 +00:00
- rule_6.2.4
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.5 | AUDIT | Ensure no duplicate GIDs exist"
2022-03-30 16:18:11 +01:00
block :
2023-01-13 10:04:33 +00:00
- name : "6.2.5 | AUDIT | Ensure no duplicate GIDs exist | Check for duplicate GIDs"
ansible.builtin.shell : "pwck -r | awk -F: '{if ($3 in users) print $1 ; else users[$3]}' /etc/group"
2022-03-30 16:18:11 +01:00
changed_when : false
failed_when : false
2023-01-13 10:04:33 +00:00
register : rhel9cis_6_2_5_user_user_check
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.5 | AUDIT | Ensure no duplicate GIDs exist | Print warning about users with duplicate GIDs"
ansible.builtin.debug :
msg : "Warning!! The following groups have duplicate GIDs: {{ rhel9cis_6_2_5_user_user_check.stdout_lines }}"
when : rhel9cis_6_2_5_user_user_check.stdout | length >= 1
2022-07-20 17:13:33 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.5 | AUDIT | Ensure no duplicate GIDs exist | warning count"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
vars :
warn_control_id : '6.2.5'
when : rhel9cis_6_2_5_user_user_check.stdout_lines | length >= 1
2022-07-20 17:13:33 +01:00
2022-01-07 09:06:18 +00:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_5
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
2022-03-30 16:18:11 +01:00
- audit
- accounts
- groups
2023-01-13 10:04:33 +00:00
- rule_6.2.5
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.6 | AUDIT | Ensure no duplicate user names exist"
2022-03-30 16:18:11 +01:00
block :
2023-01-13 10:04:33 +00:00
- name : "6.2.6 | AUDIT | Ensure no duplicate user names exist | Check for duplicate User Names"
ansible.builtin.shell : "pwck -r | awk -F: '{if ($1 in users) print $1 ; else users[$1]}' /etc/passwd"
2022-03-30 16:18:11 +01:00
changed_when : false
failed_when : false
2023-01-13 10:04:33 +00:00
register : rhel9cis_6_2_6_user_username_check
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.6 | AUDIT | Ensure no duplicate user names exist | Print warning about users with duplicate User Names"
ansible.builtin.debug :
2023-01-24 11:02:32 +00:00
msg : "Warning!! The following user names are duplicates: {{ rhel9cis_6_2_6_user_username_check.stdout_lines }}"
2023-01-13 10:04:33 +00:00
when : rhel9cis_6_2_6_user_username_check.stdout | length >= 1
2022-07-20 17:13:33 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.6 | AUDIT | Ensure no duplicate user names exist | warning count"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
vars :
warn_control_id : '6.2.6'
when : rhel9cis_6_2_6_user_username_check.stdout | length >= 1
2022-01-07 09:06:18 +00:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_6
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
2022-03-30 16:18:11 +01:00
- audit
- accounts
- users
2023-01-13 10:04:33 +00:00
- rule_6.2.6
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.7 | AUDIT | Ensure no duplicate group names exist"
2022-03-30 16:18:11 +01:00
block :
2023-01-13 10:04:33 +00:00
- name : "6.2.7 | AUDIT | Ensure no duplicate group names exist | Check for duplicate group names"
ansible.builtin.shell: 'getent passwd | cut -d : -f1 | sort -n | uniq -d'
2022-03-30 16:18:11 +01:00
changed_when : false
failed_when : false
2022-09-16 11:34:42 +01:00
check_mode : false
2023-01-13 10:04:33 +00:00
register : rhel9cis_6_2_7_group_group_check
- name : "6.2.7 | AUDIT | Ensure no duplicate group names exist | Print warning about users with duplicate group names"
ansible.builtin.debug :
msg : "Warning!! The following group names are duplicates: {{ rhel9cis_6_2_7_group_group_check.stdout_lines }}"
when : rhel9cis_6_2_7_group_group_check.stdout is not defined
- name : "6.2.7 | AUDIT | Ensure no duplicate group names exist | warning count"
2023-09-21 15:07:52 +01:00
ansible.builtin.import_tasks :
2023-09-21 15:35:35 +01:00
file : warning_facts.yml
2023-01-13 10:04:33 +00:00
vars :
warn_control_id : '6.2.7'
when : rhel9cis_6_2_7_group_group_check.stdout is not defined
2022-03-30 16:18:11 +01:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_7
2022-03-30 16:18:11 +01:00
tags :
- level1-server
- level1-workstation
- audit
- accounts
- groups
2023-01-13 10:04:33 +00:00
- rule_6.2.7
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.8 | PATCH | Ensure root PATH Integrity"
2022-03-30 16:18:11 +01:00
block :
2023-01-26 08:31:12 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Get root paths"
ansible.builtin.shell : sudo -Hiu root env | grep '^PATH' | cut -d= -f2
2022-09-16 11:34:42 +01:00
changed_when : false
2023-01-26 08:31:12 +00:00
register : rhel9cis_6_2_8_root_paths
2023-01-27 11:03:23 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Get root paths"
ansible.builtin.shell : sudo -Hiu root env | grep '^PATH' | cut -d= -f2 | tr ":" "\n"
changed_when : false
register : rhel9cis_6_2_8_root_paths_split
2023-01-26 08:31:12 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Set fact"
ansible.builtin.set_fact :
root_paths : "{{ rhel9cis_6_2_8_root_paths.stdout }}"
2022-03-30 16:18:11 +01:00
2023-01-26 08:31:12 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Check for empty dirs"
ansible.builtin.shell : 'echo {{ root_paths }} | grep -q "::" && echo "roots path contains a empty directory (::)"'
2022-09-16 11:34:42 +01:00
changed_when : false
2023-01-26 08:31:12 +00:00
failed_when : root_path_empty_dir.rc not in [ 0, 1 ]
register : root_path_empty_dir
2022-03-30 16:18:11 +01:00
2023-01-26 08:31:12 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Check for trailing ':'"
ansible.builtin.shell : '{{ root_paths }} | cut -d= -f2 | grep -q ":$" && echo "roots path contains a trailing (:)"'
2022-09-16 11:34:42 +01:00
changed_when : false
2023-01-26 08:31:12 +00:00
failed_when : root_path_trailing_colon.rc not in [ 0, 1 ]
register : root_path_trailing_colon
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Check for owner and permissions"
block :
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Check for owner and permissions"
ansible.builtin.stat :
path : "{{ item }}"
register : root_path_perms
2023-01-27 11:03:23 +00:00
loop : "{{ rhel9cis_6_2_8_root_paths_split.stdout_lines }}"
2023-01-26 08:31:12 +00:00
2023-01-26 15:01:12 +00:00
- name : "6.2.8 | AUDIT | Ensure root PATH Integrity | Set permissions"
2023-01-26 08:31:12 +00:00
ansible.builtin.file :
path : "{{ item.stat.path }}"
state : directory
owner : root
group : root
2023-01-26 15:01:12 +00:00
mode : "0755"
follow : false
2023-01-26 08:31:12 +00:00
loop : "{{ root_path_perms.results }}"
loop_control :
2023-01-26 15:01:12 +00:00
label : "{{ item }}"
2023-01-26 08:31:12 +00:00
when :
2023-01-26 15:01:12 +00:00
- item.stat.exists
- item.stat.isdir
- item.stat.pw_name != 'root' or item.stat.gr_name != 'root' or item.stat.woth or item.stat.wgrp
2022-03-30 16:18:11 +01:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_8
2022-03-30 16:18:11 +01:00
tags :
- level1-server
- level1-workstation
- patch
- paths
2023-01-13 10:04:33 +00:00
- rule_6.2.8
2022-03-30 16:18:11 +01:00
2023-01-13 10:04:33 +00:00
- name : "6.2.9 | PATCH | Ensure root is the only UID 0 account"
ansible.builtin.shell : passwd -l {{ item }}
2022-01-07 09:06:18 +00:00
changed_when : false
failed_when : false
2023-01-25 09:47:26 +00:00
loop : "{{ rhel9cis_uid_zero_accounts_except_root.stdout_lines }}"
2022-01-07 09:06:18 +00:00
when :
2022-03-30 16:18:11 +01:00
- rhel9cis_uid_zero_accounts_except_root.rc
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_9
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- accounts
- users
2023-01-13 10:04:33 +00:00
- rule_6.2.9
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.10 | PATCH | Ensure local interactive user home directories exist"
2022-01-07 09:06:18 +00:00
block :
2023-01-26 12:10:23 +00:00
- name : "6.2.10 | PATCH | Ensure local interactive user home directories exist | Create dir if absent"
2023-01-13 10:04:33 +00:00
ansible.builtin.file :
2023-01-26 12:10:23 +00:00
path : "{{ item.dir }}"
state : directory
owner : "{{ item.id }}"
group : "{{ item.gid }}"
register : rhel_09_6_2_10_home_dir
loop : "{{ rhel9cis_passwd | selectattr('uid', '>=', min_int_uid | int ) | selectattr('uid', '<=', max_int_uid | int ) | list }}"
2022-01-07 09:06:18 +00:00
loop_control :
2023-01-26 12:10:23 +00:00
label : "{{ item.id }}"
2022-01-07 09:06:18 +00:00
# set default ACLs so the homedir has an effective umask of 0027
2023-01-26 12:10:23 +00:00
- name : "6.2.10 | PATCH | Ensure local interactive user home directories exist | Set group ACL"
ansible.posix.acl :
path : "{{ item }}"
default : true
etype : group
permissions : rx
state : present
loop : "{{ interactive_users_home.stdout_lines }}"
when : not system_is_container
- name : "6.2.10 | PATCH | Ensure local interactive user home directories exist | Set other ACL"
2023-01-13 10:04:33 +00:00
ansible.posix.acl :
2023-01-26 12:10:23 +00:00
path : "{{ item }}"
2022-09-16 11:34:42 +01:00
default : true
2023-01-26 12:10:23 +00:00
etype : other
permissions : 0
2022-01-07 09:06:18 +00:00
state : present
2023-01-26 12:10:23 +00:00
loop : "{{ interactive_users_home.stdout_lines }}"
2023-01-26 09:48:10 +00:00
when : not system_is_container
2022-01-07 09:06:18 +00:00
when :
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_10
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
2023-01-13 10:04:33 +00:00
- rule_6.2.10
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.11 | PATCH | Ensure local interactive users own their home directories"
ansible.builtin.file :
2022-01-07 09:06:18 +00:00
path : "{{ item.dir }}"
owner : "{{ item.id }}"
state : directory
2023-01-26 12:10:23 +00:00
loop : "{{ rhel9cis_passwd | selectattr('uid', '>=', min_int_uid | int ) | selectattr('uid', '<=', max_int_uid | int ) | list }}"
2022-01-07 09:06:18 +00:00
loop_control :
2023-01-26 12:10:23 +00:00
label : "{{ item.id }}"
2022-01-07 09:06:18 +00:00
when :
2022-07-20 17:13:33 +01:00
- item.uid >= min_int_uid | int
- item.id != 'nobody'
2022-09-27 17:15:49 +02:00
- (item.id != 'tss' and item.dir != '/dev/null')
2023-01-19 16:29:44 +00:00
- item.shell != '/sbin/nologin'
2023-01-13 10:04:33 +00:00
- rhel9cis_rule_6_2_11
2022-01-07 09:06:18 +00:00
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
2023-01-19 16:29:44 +00:00
- rule_6.2.11
2022-01-07 09:06:18 +00:00
2023-01-13 10:04:33 +00:00
- name : "6.2.12 | PATCH | Ensure local interactive user home directories are mode 750 or more restrictive"
2022-01-07 09:06:18 +00:00
block :
2023-01-26 12:10:23 +00:00
- name : "6.2.12 | AUDIT | Ensure local interactive user home directories are mode 750 or more restrictive | get stat"
2023-01-13 10:04:33 +00:00
ansible.builtin.stat :
2022-03-30 16:18:11 +01:00
path : "{{ item }}"
2023-01-26 12:10:23 +00:00
register : rhel_09_6_2_12_home_dir_perms
loop : "{{ interactive_users_home.stdout_lines }}"
2022-01-07 09:06:18 +00:00
2023-01-26 12:10:23 +00:00
- name : "6.2.12 | PATCH | Ensure local interactive user home directories are mode 750 or more restrictive | amend if needed"
2023-01-13 10:04:33 +00:00
ansible.builtin.file :
2023-01-26 12:10:23 +00:00
path : "{{ item.stat.path }}"
state : directory
mode : "0750"
loop : "{{ rhel_09_6_2_12_home_dir_perms.results }}"
2022-03-30 16:18:11 +01:00
loop_control :
2023-01-26 12:10:23 +00:00
label : "{{ item }}"
2023-01-25 09:47:26 +00:00
when :
2023-01-26 12:10:23 +00:00
- item.stat.mode > '0750'
2022-01-07 09:06:18 +00:00
2022-03-30 16:18:11 +01:00
# set default ACLs so the homedir has an effective umask of 0027
2023-01-26 12:10:23 +00:00
- name : "6.2.12 | PATCH | Ensure local interactive user home directories are mode 750 or more restrictive | Set group ACL"
2023-01-13 10:04:33 +00:00
ansible.posix.acl :
2023-01-26 12:10:23 +00:00
path : "{{ item }}"
2022-09-16 11:34:42 +01:00
default : true
2023-01-26 12:10:23 +00:00
etype : group
permissions : rx
2022-03-30 16:18:11 +01:00
state : present
2023-01-26 12:10:23 +00:00
loop : "{{ interactive_users_home.stdout_lines }}"
when : not system_is_container
- name : "6.2.12 | PATCH | Ensure local interactive user home directories are mode 750 or more restrictive | Set other ACL"
ansible.posix.acl :
path : "{{ item }}"
default : true
etype : other
permissions : 0
state : present
loop : "{{ interactive_users_home.stdout_lines }}"
when : not system_is_container
2022-01-07 09:06:18 +00:00
when :
- rhel9cis_rule_6_2_12
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
- permissions
2022-01-07 09:06:18 +00:00
- rule_6.2.12
2023-01-13 10:04:33 +00:00
- name : "6.2.13 | PATCH | Ensure no local interactive user has .netrc files"
ansible.builtin.file :
2023-01-19 16:29:44 +00:00
path : "{{ item }}/.netrc"
2023-01-13 10:04:33 +00:00
state : absent
2023-01-25 09:47:26 +00:00
loop : "{{ interactive_users_home.stdout_lines }}"
2022-01-07 09:06:18 +00:00
when :
- rhel9cis_rule_6_2_13
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
- permissions
2022-01-07 09:06:18 +00:00
- rule_6.2.13
2023-01-13 10:04:33 +00:00
- name : "6.2.14 | PATCH | Ensure no local interactive user has .forward files"
ansible.builtin.file :
2023-01-19 16:29:44 +00:00
path : "{{ item }}/.forward"
2022-03-30 16:18:11 +01:00
state : absent
2023-01-25 09:47:26 +00:00
loop : "{{ interactive_users_home.stdout_lines }}"
2022-01-07 09:06:18 +00:00
when :
- rhel9cis_rule_6_2_14
tags :
- level1-server
- level1-workstation
2022-03-30 16:18:11 +01:00
- patch
- users
- files
2022-01-07 09:06:18 +00:00
- rule_6.2.14
2023-01-19 16:29:44 +00:00
- name : "6.2.15 | PATCH | Ensure no local interactive user has .rhosts files"
2023-01-13 10:04:33 +00:00
ansible.builtin.file :
path : "~{{ item }}/.rhosts"
2022-03-30 16:18:11 +01:00
state : absent
2023-01-25 09:47:26 +00:00
loop : "{{ interactive_users_home.stdout_lines }}"
2022-01-07 09:06:18 +00:00
when :
- rhel9cis_rule_6_2_15
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
- files
2022-01-07 09:06:18 +00:00
- rule_6.2.15
2023-01-13 10:04:33 +00:00
- name : "6.2.16 | PATCH | Ensure local interactive user dot files are not group or world writable"
block :
2023-01-19 16:29:44 +00:00
- name : "6.2.16 | AUDIT | Ensure local interactive user dot files are not group or world writable | Check for files"
ansible.builtin.find :
2023-01-19 16:55:12 +00:00
path : /home
2023-01-19 16:29:44 +00:00
depth : 3
patterns : ".*"
hidden : true
recurse : true
file_type : file
register : user_dot_files
2023-01-13 10:04:33 +00:00
2023-01-19 16:29:44 +00:00
- name : "6.2.16 | AUDIT | Ensure local interactive user dot files are not group or world writable | update permissions"
2023-01-13 10:04:33 +00:00
ansible.builtin.file :
2023-01-19 16:29:44 +00:00
path : "{{ item.path }}"
2023-01-13 10:04:33 +00:00
mode : go-w
2023-02-14 08:54:21 +00:00
follow : "{{ rhel_09_6_2_16_home_follow_symlinks }}"
2023-01-19 16:29:44 +00:00
loop : "{{ user_dot_files.files }}"
loop_control :
label : "{{ item.path }}"
2022-01-07 09:06:18 +00:00
when :
- rhel9cis_rule_6_2_16
tags :
- level1-server
- level1-workstation
- patch
2022-03-30 16:18:11 +01:00
- users
2023-01-13 10:04:33 +00:00
- permissions
2022-03-30 16:18:11 +01:00
- rule_6.2.16