forked from ComplianceAsCode/content
/
rule.yml
40 lines (30 loc) · 1.25 KB
/
rule.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
documentation_complete: true
prodtype: rhel7,rhel8,sle15
title: 'Disable httpd Service'
description: |-
{{{ describe_service_disable(service="httpd") }}}
rationale: |-
Running web server software provides a network-based avenue
of attack, and should be disabled if not needed.
severity: unknown
identifiers:
cce@rhel7: CCE-80300-7
cce@rhel8: CCE-82761-8
references:
cis@rhel7: 2.2.10
cis@rhel8: 2.2.9
nist: CM-7(a),CM-7(b),CM-6(a)
nist-csf: PR.IP-1,PR.PT-3
isa-62443-2013: 'SR 1.1,SR 1.10,SR 1.11,SR 1.12,SR 1.13,SR 1.2,SR 1.3,SR 1.4,SR 1.5,SR 1.6,SR 1.7,SR 1.8,SR 1.9,SR 2.1,SR 2.2,SR 2.3,SR 2.4,SR 2.5,SR 2.6,SR 2.7,SR 7.6'
isa-62443-2009: 4.3.3.5.1,4.3.3.5.2,4.3.3.5.3,4.3.3.5.4,4.3.3.5.5,4.3.3.5.6,4.3.3.5.7,4.3.3.5.8,4.3.3.6.1,4.3.3.6.2,4.3.3.6.3,4.3.3.6.4,4.3.3.6.5,4.3.3.6.6,4.3.3.6.7,4.3.3.6.8,4.3.3.6.9,4.3.3.7.1,4.3.3.7.2,4.3.3.7.3,4.3.3.7.4,4.3.4.3.2,4.3.4.3.3
cobit5: BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS05.02,DSS05.05,DSS06.06
iso27001-2013: A.12.1.2,A.12.5.1,A.12.6.2,A.14.2.2,A.14.2.3,A.14.2.4,A.9.1.2
cis-csc: 11,14,3,9
cis@sle15: 2.2.10
ocil: |-
{{{ ocil_service_disabled(service="httpd") }}}
platform: machine
template:
name: service_disabled
vars:
servicename: httpd