CIS AlmaLinux OS 8 Workstation L2 v3.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS AlmaLinux OS 8 Workstation L2 v3.0.0

Updated: 10/8/2025

Authority: CIS

Plugin: Unix

Revision: 1.7

Estimated Item Count: 64

File Details

Filename: CIS_AlmaLinux_OS_8_Workstation_v3.0.0_L2.audit

Size: 320 kB

MD5: 6d1291ad1d95824ae8eba70c8445da21
SHA256: b79b640acc5bbd15e49de1b0b3eab386cd0b5ea8d960c0f2699a98ff04283dd5

Audit Items

DescriptionCategories
1.1.1.6 Ensure squashfs kernel module is not available
1.1.1.7 Ensure udf kernel module is not available
1.1.1.8 Ensure usb-storage kernel module is not available
1.1.2.3.1 Ensure separate partition exists for /home
1.1.2.4.1 Ensure separate partition exists for /var
1.1.2.5.1 Ensure separate partition exists for /var/tmp
1.1.2.6.1 Ensure separate partition exists for /var/log
1.1.2.7.1 Ensure separate partition exists for /var/log/audit
1.2.3 Ensure repo_gpgcheck is globally activated
1.5.1.5 Ensure the SELinux mode is enforcing

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.8.6 Ensure GDM automatic mounting of removable media is disabled
1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden
2.2.1 Ensure autofs services are not in use
2.2.2 Ensure avahi daemon services are not in use
2.3.2 Ensure ldap client is not installed
3.1.3 Ensure bluetooth services are not in use
3.2.1 Ensure dccp kernel module is not available
3.2.2 Ensure tipc kernel module is not available
3.2.3 Ensure rds kernel module is not available
3.2.4 Ensure sctp kernel module is not available
4.3.4 Ensure users must provide password for escalation
4.4.3.1.3 Ensure password failed attempts lockout includes root account
4.5.3.1 Ensure nologin is not listed in /etc/shells
5.2.1.1 Ensure audit is installed
5.2.1.2 Ensure auditing for processes that start prior to auditd is enabled
5.2.1.3 Ensure audit_backlog_limit is sufficient
5.2.1.4 Ensure auditd service is enabled
5.2.2.1 Ensure audit log storage size is configured
5.2.2.2 Ensure audit logs are not automatically deleted
5.2.2.3 Ensure system is disabled when audit logs are full
5.2.2.4 Ensure system warns when audit logs are low on space
5.2.3.1 Ensure changes to system administration scope (sudoers) is collected
5.2.3.2 Ensure actions as another user are always logged
5.2.3.3 Ensure events that modify the sudo log file are collected
5.2.3.4 Ensure events that modify date and time information are collected
5.2.3.5 Ensure events that modify the system's network environment are collected
5.2.3.6 Ensure use of privileged commands are collected
5.2.3.7 Ensure unsuccessful file access attempts are collected
5.2.3.8 Ensure events that modify user/group information are collected
5.2.3.9 Ensure discretionary access control permission modification events are collected
5.2.3.10 Ensure successful file system mounts are collected
5.2.3.11 Ensure session initiation information is collected
5.2.3.12 Ensure login and logout events are collected
5.2.3.13 Ensure file deletion events by users are collected
5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collected
5.2.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recorded
5.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recorded
5.2.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recorded
5.2.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recorded
5.2.3.19 Ensure kernel module loading unloading and modification is collected