Skip to content

Commit

Permalink
Fix comment-text to reflect broader (mis)specification
Browse files Browse the repository at this point in the history
  • Loading branch information
ferricoxide committed May 9, 2023
1 parent 3492b3e commit f7dabfa
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions docs/findings/el8.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,9 @@
| | |
| | RHEL-08-010000 |
+----------------------------------------------------------------------------------------+---------------------+
| `"Only Authorized Local User Accounts Exist on Operating System" is always flagged`_ | V-248713 |
| `"Only Authorized Local User Accounts Exist on Operating System" is always flagged`_ | V-230379 |
| | |
| | OL08-00-020320 |
| | RHEL-08-020320 |
+----------------------------------------------------------------------------------------+---------------------+
```

Expand Down Expand Up @@ -262,8 +262,8 @@ If using a vendor-supported Linux and this scan finding occurs, it's likely that

**Expected Finding:**

Finding is specific to Oracle Linux 8 STIG profile. Per the STIG notes:
Per the STIG notes:

> Automatic remediation of this control is not available due to the unique requirements of each system.
While automation _could_ be authored that would leverage a site- or host-specific allowed-users list to disable or delete forbidden accounts, there exists an extremely-high likelihood that scanners used against such configuration-controlled operating environments would not contain the scanning logic necessary to validate compliance. As such and with or without user-controlling automation-content, STIG scanners would still flag systems that are technically compliant.
While-automation _could_ be authored that would leverage a site- or host-specific allowed-users list to disable or delete forbidden accounts, there exists an extremely-high likelihood that scanners used against such configuration-controlled operating environments would not contain the scanning logic necessary to validate compliance. As such – and with or without user-controlling automation-content – STIG scanners would still flag systems that are technically compliant.

0 comments on commit f7dabfa

Please sign in to comment.