mirror of
https://github.com/dev-sec/ansible-collection-hardening
synced 2024-11-10 09:14:18 +00:00
Fix typo
Signed-off-by: Ruslan Baratov <ruslan_baratov@yahoo.com>
This commit is contained in:
parent
6d5a401207
commit
8e891f2575
1 changed files with 1 additions and 1 deletions
|
@ -57,7 +57,7 @@ Otherwise inspec will fail. For more information, see [issue #124](https://githu
|
||||||
| `os_security_suid_sgid_blacklist`| [] | a list of paths which should have their SUID/SGID bits removed|
|
| `os_security_suid_sgid_blacklist`| [] | a list of paths which should have their SUID/SGID bits removed|
|
||||||
| `os_security_suid_sgid_whitelist`| [] | a list of paths which should not have their SUID/SGID bits altered|
|
| `os_security_suid_sgid_whitelist`| [] | a list of paths which should not have their SUID/SGID bits altered|
|
||||||
| `os_security_suid_sgid_remove_from_unknown`| false | true if you want to remove SUID/SGID bits from any file, that is not explicitly configured in a `blacklist`. This will make every Ansible-run search through the mounted filesystems looking for SUID/SGID bits that are not configured in the default and user blacklist. If it finds an SUID/SGID bit, it will be removed, unless this file is in your `whitelist`.|
|
| `os_security_suid_sgid_remove_from_unknown`| false | true if you want to remove SUID/SGID bits from any file, that is not explicitly configured in a `blacklist`. This will make every Ansible-run search through the mounted filesystems looking for SUID/SGID bits that are not configured in the default and user blacklist. If it finds an SUID/SGID bit, it will be removed, unless this file is in your `whitelist`.|
|
||||||
| `os_security_packages_clean'`| true | removes packages with known issues. See section packages.|
|
| `os_security_packages_clean`| true | removes packages with known issues. See section packages.|
|
||||||
| `ufw_manage_defaults` | true | true means apply all settings with `ufw_` prefix|
|
| `ufw_manage_defaults` | true | true means apply all settings with `ufw_` prefix|
|
||||||
| `ufw_ipt_sysctl` | '' | by default it disables IPT_SYSCTL in /etc/default/ufw. If you want to overwrite /etc/sysctl.conf values using ufw - set it to your sysctl dictionary, for example `/etc/ufw/sysctl.conf`
|
| `ufw_ipt_sysctl` | '' | by default it disables IPT_SYSCTL in /etc/default/ufw. If you want to overwrite /etc/sysctl.conf values using ufw - set it to your sysctl dictionary, for example `/etc/ufw/sysctl.conf`
|
||||||
| `ufw_default_input_policy` | DROP | set default input policy of ufw to `DROP` |
|
| `ufw_default_input_policy` | DROP | set default input policy of ufw to `DROP` |
|
||||||
|
|
Loading…
Reference in a new issue