CIS AlmaLinux OS 8 Workstation L1 v2.0.0

Audit Details

Name: CIS AlmaLinux OS 8 Workstation L1 v2.0.0

Updated: 9/19/2022

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 335

File Details

Filename: CIS_AlmaLinux_OS_8_Workstation_v2.0.0_L1.audit

Size: 918 kB

MD5: 983b28350b798bbf3b4d6d05351e4df9
SHA256: c54e131db285f3895e70f5c9b097783f437a5f292e7e9b32855ffb8afa15d48c

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - blacklist

CONFIGURATION MANAGEMENT

1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod

CONFIGURATION MANAGEMENT

1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe

CONFIGURATION MANAGEMENT

1.1.2.1 Ensure /tmp is a separate partition - mount

CONFIGURATION MANAGEMENT

1.1.2.1 Ensure /tmp is a separate partition - systemctl

CONFIGURATION MANAGEMENT

1.1.2.2 Ensure nodev option set on /tmp partition

CONFIGURATION MANAGEMENT

1.1.2.3 Ensure noexec option set on /tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4 Ensure nosuid option set on /tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.3.2 Ensure nodev option set on /var partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.3.3 Ensure noexec option set on /var partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.3.4 Ensure nosuid option set on /var partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.4.2 Ensure noexec option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.4.3 Ensure nosuid option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.4.4 Ensure nodev option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.5.2 Ensure nodev option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.5.3 Ensure noexec option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.5.4 Ensure nosuid option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.6.2 Ensure noexec option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.6.3 Ensure nodev option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.6.4 Ensure nosuid option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.2 Ensure nodev option set on /home partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.3 Ensure nosuid option set on /home partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.4 Ensure usrquota option set on /home partition - findmnt

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.4 Ensure usrquota option set on /home partition - quotaon

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.5 Ensure grpquota option set on /home partition - findmnt

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.5 Ensure grpquota option set on /home partition - quotaon

ACCESS CONTROL, MEDIA PROTECTION

1.1.8.1 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.8.2 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.8.3 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.2.1 Ensure GPG keys are configured

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activated

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure package manager repositories are configured

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure AIDE is installed

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - cron

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.service

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.timer

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl status aidecheck.timer

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.4.1 Ensure bootloader password is set

ACCESS CONTROL, MEDIA PROTECTION

1.4.2 Ensure permissions on bootloader config are configured

ACCESS CONTROL, MEDIA PROTECTION

1.4.3 Ensure authentication is required when booting into rescue mode - emergency.service

IDENTIFICATION AND AUTHENTICATION

1.4.3 Ensure authentication is required when booting into rescue mode - rescue.service

IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dump storage is disabled

CONFIGURATION MANAGEMENT

1.5.2 Ensure core dump backtraces are disabled

ACCESS CONTROL

1.5.3 Ensure address space layout randomization (ASLR) is enabled - files

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl

SYSTEM AND INFORMATION INTEGRITY

1.6.1.1 Ensure SELinux is installed

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure SELinux is not disabled in bootloader configuration

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configured - sestatus

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.4 Ensure the SELinux mode is not disabled - /etc/selinux/config

ACCESS CONTROL, MEDIA PROTECTION