Add audit rules for cron dirs to Ubuntu 22.04 STIG#14416
Merged
dodys merged 1 commit intoComplianceAsCode:masterfrom Feb 20, 2026
Merged
Add audit rules for cron dirs to Ubuntu 22.04 STIG#14416dodys merged 1 commit intoComplianceAsCode:masterfrom
dodys merged 1 commit intoComplianceAsCode:masterfrom
Conversation
Aligns with UBTU-22-654041 (Ubuntu 22.04 LTS must audit any script or executable called by cron as root or by any privileged user)
|
@mpurg: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
hdean3
added a commit
to hdean3/content
that referenced
this pull request
Feb 26, 2026
All V2R7 control PRs (ComplianceAsCode#14427, ComplianceAsCode#14418, ComplianceAsCode#14415, ComplianceAsCode#14416, ComplianceAsCode#14433) were merged without updating the version metadata fields. This causes STIG Viewer imports and auditor reports to display V2R3 while the actual content reflects V2R7 rules. Updated files: - controls/stig_ubuntu2204.yml: version V2R3 → V2R7 - products/ubuntu2204/profiles/stig.profile: version, title, and description strings V2R3 → V2R7
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description:
Add audit rules for cron dirs to Ubuntu 22.04 STIG
Rationale:
Aligns with UBTU-22-654041
(Ubuntu 22.04 LTS must audit any script or executable called by cron as root or by any privileged user)
Tests:
(KVM)