forked from ansible-lockdown/RHEL9-CIS
linting fqcn
Signed-off-by: Mark Bolwell <mark.bollyuk@gmail.com>
This commit is contained in:
parent
60d01a6582
commit
c18151e158
7 changed files with 88 additions and 89 deletions
|
|
@ -3,7 +3,7 @@
|
|||
- name: "5.6.2 | PATCH | Ensure system accounts are secured"
|
||||
block:
|
||||
- name: "5.6.2 | Ensure system accounts are secured | Set nologin"
|
||||
user:
|
||||
ansible.builtin.user:
|
||||
name: "{{ item.id }}"
|
||||
shell: /usr/sbin/nologin
|
||||
with_items:
|
||||
|
|
@ -21,11 +21,10 @@
|
|||
label: "{{ item.id }}"
|
||||
|
||||
- name: "5.6.2 | PATCH | Ensure system accounts are secured | Lock accounts"
|
||||
user:
|
||||
ansible.builtin.user:
|
||||
name: "{{ item.id }}"
|
||||
password_lock: true
|
||||
with_items:
|
||||
- "{{ rhel9cis_passwd }}"
|
||||
loop: "{{ rhel9cis_passwd }}"
|
||||
when:
|
||||
- item.id != "halt"
|
||||
- item.id != "shutdown"
|
||||
|
|
@ -48,7 +47,7 @@
|
|||
- rule_5.6.2
|
||||
|
||||
- name: "5.6.3 | PATCH | Ensure default user shell timeout is 900 seconds or less"
|
||||
blockinfile:
|
||||
ansible.builtin.blockinfile:
|
||||
create: true
|
||||
mode: 0644
|
||||
dest: "{{ item.dest }}"
|
||||
|
|
@ -58,7 +57,7 @@
|
|||
TMOUT={{ rhel9cis_shell_session_timeout.timeout }}
|
||||
export TMOUT
|
||||
readonly TMOUT
|
||||
with_items:
|
||||
loop:
|
||||
- { dest: "{{ rhel9cis_shell_session_timeout.file }}", state: present }
|
||||
- { dest: /etc/profile, state: "{{ (rhel9cis_shell_session_timeout.file == '/etc/profile') | ternary('present', 'absent') }}" }
|
||||
when:
|
||||
|
|
@ -72,7 +71,7 @@
|
|||
- rule_5.6.3
|
||||
|
||||
- name: "5.6.4 | PATCH | Ensure default group for the root account is GID 0"
|
||||
user:
|
||||
ansible.builtin.user:
|
||||
name: root
|
||||
group: 0
|
||||
when:
|
||||
|
|
@ -88,7 +87,7 @@
|
|||
- name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive"
|
||||
block:
|
||||
- name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Set umask for /etc/login.defs pam_umask settings"
|
||||
replace:
|
||||
ansible.builtin.replace:
|
||||
path: /etc/login.defs
|
||||
regexp: "{{ item.regexp }}"
|
||||
replace: "{{ item.replace }}"
|
||||
|
|
@ -97,13 +96,13 @@
|
|||
- { regexp: '(USERGROUPS_ENAB\s+)yes', replace: '\1 no' }
|
||||
|
||||
- name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Set umask for /etc/bashrc"
|
||||
replace:
|
||||
ansible.builtin.replace:
|
||||
path: /etc/bashrc
|
||||
regexp: '^(?i)(\s+UMASK|UMASK)\s0[0-2][0-6]'
|
||||
replace: '\1 027'
|
||||
|
||||
- name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Set umask for /etc/profile"
|
||||
replace:
|
||||
ansible.builtin.replace:
|
||||
path: /etc/profile
|
||||
regexp: '^(?i)(\s+UMASK|UMASK)\s0[0-2][0-6]'
|
||||
replace: '\1 027'
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue