From 2a26bbac2e9e54aa1267995f61a54915f91fb38c Mon Sep 17 00:00:00 2001 From: Seth Grover Date: Mon, 12 Sep 2022 16:16:32 -0600 Subject: [PATCH] documentation tweaks for hardening (see idaholab/Malcolm#111) --- README.md | 4 ++-- sensor-iso/README.md | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 89c237775..3d454a824 100644 --- a/README.md +++ b/README.md @@ -3594,12 +3594,12 @@ Upon configuring time synchronization, a "Time synchronization configured succes The Malcolm aggregator base operating system uses the [harbian-audit Hardening](https://github.com/hardenedlinux/harbian-audit) benchmarks which target the following guidelines for establishing a secure configuration posture: * [CIS Debian Linux 9/10 Benchmark](https://www.cisecurity.org/cis-benchmarks/cis-benchmarks-faq/) -* [DISA STIG (Security Technical Implementation Guides for RHEL 7](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/) v2r5 Ubuntu v1r2 [adapted](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) for a Debian operating system +* [DISA STIG (Security Technical Implementation Guides) for RHEL 7](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/) v2r5 Ubuntu v1r2 [adapted](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) for a Debian operating system * Additional recommendations from [cisecurity.org](https://www.cisecurity.org/) #### Compliance Exceptions -[Currently](https://github.com/hardenedlinux/harbian-audit/tree/master/bin/hardening) there are 274 checks to determine compliance with the CIS Debian Linux Benchmark. +[Currently](https://github.com/hardenedlinux/harbian-audit/tree/master/bin/hardening) there are 274 checks to determine compliance the with the [harbian-audit](https://github.com/hardenedlinux/harbian-audit) benchmark. The Malcolm aggregator base operating system claims exceptions from the recommendations in this benchmark in the following categories: diff --git a/sensor-iso/README.md b/sensor-iso/README.md index 112e3c45d..4c28d851b 100644 --- a/sensor-iso/README.md +++ b/sensor-iso/README.md @@ -433,15 +433,15 @@ Should the sensor not function as expected, first try rebooting the device. If t # Appendix D - Hardening -Hedgehog Linux uses the [harbian-audit Hardening](https://github.com/hardenedlinux/harbian-audit) benchmarks which target the following guidelines for establishing a secure configuration posture: +Hedgehog Linux uses the [harbian-audit](https://github.com/hardenedlinux/harbian-audit) benchmarks which target the following guidelines for establishing a secure configuration posture: * [CIS Debian Linux 9/10 Benchmark](https://www.cisecurity.org/cis-benchmarks/cis-benchmarks-faq/) -* [DISA STIG (Security Technical Implementation Guides for RHEL 7](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/) v2r5 Ubuntu v1r2 [adapted](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) for a Debian operating system +* [DISA STIG (Security Technical Implementation Guides) for RHEL 7](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/) v2r5 Ubuntu v1r2 [adapted](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) for a Debian operating system * Additional recommendations from [cisecurity.org](https://www.cisecurity.org/) ## Compliance Exceptions -[Currently](https://github.com/hardenedlinux/harbian-audit/tree/master/bin/hardening) there are 274 checks to determine compliance with the CIS Debian Linux Benchmark. +[Currently](https://github.com/hardenedlinux/harbian-audit/tree/master/bin/hardening) there are 274 checks to determine compliance the with the [harbian-audit](https://github.com/hardenedlinux/harbian-audit) benchmark. Hedgehog Linux claims exceptions from the recommendations in this benchmark in the following categories: