Skip to content

Commit 0a036fa

Browse files
committed
remov enable_fips_mode rule entirely
Per the STIG prose, the requirement does not exist there anymore. Or more exactly, it is covered by implementing proper FIPS crypto policy.
1 parent 726cc9f commit 0a036fa

3 files changed

Lines changed: 0 additions & 4 deletions

File tree

products/rhel8/controls/stig_rhel8.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,6 @@ controls:
7070
- var_authselect_profile=sssd
7171
- var_multiple_time_servers=stig
7272
- var_time_service_set_maxpoll=18_hours
73-
# Enable / Configure FIPS
74-
- enable_fips_mode
7573
# Other needed rules
7674
- enable_authselect
7775

tests/data/profile_stability/rhel8/stig.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,6 @@ disable_users_coredumps
170170
disallow_bypass_password_sudo
171171
display_login_attempts
172172
enable_authselect
173-
enable_fips_mode
174173
enable_gpgcheck_for_all_repositories
175174
encrypt_partitions
176175
ensure_epel_repos_disabled

tests/data/profile_stability/rhel8/stig_gui.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,6 @@ disable_users_coredumps
170170
disallow_bypass_password_sudo
171171
display_login_attempts
172172
enable_authselect
173-
enable_fips_mode
174173
enable_gpgcheck_for_all_repositories
175174
encrypt_partitions
176175
ensure_epel_repos_disabled

0 commit comments

Comments
 (0)