You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file is under /var/log and is world readable (and getting changes back to world readable) so this will generate endless changes for the puppet runs when you enable
I currently use npwalker-recursive_file_permissions to set the permissions. This module ha as far as i know no exclude lists or something similar. Maybe I can write a PR for the module or use something different.
This file is under /var/log and is world readable (and getting changes back to world readable) so this will generate endless changes for the puppet runs when you enable
cis_security_hardening::rules::logfile_permissions:enforce: true
Non-world readable generic logfiles is good for the benchmark, but this file need to be ignored somehow.
See answer on the debian mailinglist here
The text was updated successfully, but these errors were encountered: