Oct 24, 2025 Functional Update- 1.1.2.1.2 Ensure nodev option set on /tmp partition
- 1.1.2.1.3 Ensure nosuid option set on /tmp partition
- 1.1.2.1.4 Ensure noexec option set on /tmp partition
- 1.1.2.2.1 Ensure /dev/shm is a separate partition
- 1.1.2.2.2 Ensure nodev option set on /dev/shm partition
- 1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
- 1.1.2.2.4 Ensure noexec option set on /dev/shm partition
- 1.1.2.3.2 Ensure nodev option set on /home partition
- 1.1.2.3.3 Ensure nosuid option set on /home partition
- 1.1.2.4.2 Ensure nodev option set on /var partition
- 1.1.2.4.3 Ensure nosuid option set on /var partition
- 1.1.2.5.2 Ensure nodev option set on /var/tmp partition
- 1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
- 1.1.2.5.4 Ensure noexec option set on /var/tmp partition
- 1.1.2.6.2 Ensure nodev option set on /var/log partition
- 1.1.2.6.3 Ensure nosuid option set on /var/log partition
- 1.1.2.6.4 Ensure noexec option set on /var/log partition
- 1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
- 1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
- 1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
- 1.6.2 Ensure system wide crypto policy is not set in sshd configuration
- 5.1.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 5.1.12 Ensure sshd HostbasedAuthentication is disabled
- 5.1.13 Ensure sshd IgnoreRhosts is enabled
- 5.1.15 Ensure sshd LogLevel is configured
- 5.1.16 Ensure sshd MaxAuthTries is configured
- 5.1.18 Ensure sshd MaxSessions is configured
- 5.1.19 Ensure sshd PermitEmptyPasswords is disabled
- 5.1.20 Ensure sshd PermitRootLogin is disabled
- 5.1.21 Ensure sshd PermitUserEnvironment is disabled
- 5.1.3 Ensure permissions on SSH public host key files are configured
- 5.1.8 Ensure sshd Banner is configured
- 5.1.9 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
- 5.2.5 Ensure re-authentication for privilege escalation is not disabled globally
- 5.3.3.2.2 Ensure password length is configured
- 5.3.3.2.4 Ensure password same consecutive characters is configured
Informational Update- 1.1.1.1 Ensure cramfs kernel module is not available
- 1.1.1.2 Ensure freevxfs kernel module is not available
- 1.1.1.3 Ensure hfs kernel module is not available
- 1.1.1.4 Ensure hfsplus kernel module is not available
- 1.1.1.5 Ensure jffs2 kernel module is not available
- 1.1.1.8 Ensure usb-storage kernel module is not available
- 1.1.1.9 Ensure unused filesystems kernel modules are not available
- 1.1.2.1.1 Ensure /tmp is a separate partition
- 1.1.2.2.1 Ensure /dev/shm is a separate partition
- 1.2.1.2 Ensure gpgcheck is globally activated
- 1.3.1.2 Ensure SELinux is not disabled in bootloader configuration
- 1.5.3 Ensure core dump backtraces are disabled
- 1.5.4 Ensure core dump storage is disabled
- 1.6.2 Ensure system wide crypto policy is not set in sshd configuration
- 1.6.3 Ensure system wide crypto policy disables sha1 hash and signature support
- 1.6.4 Ensure system wide crypto policy disables macs less than 128 bits
- 1.6.5 Ensure system wide crypto policy disables cbc for ssh
- 1.6.6 Ensure system wide crypto policy disables chacha20-poly1305 for ssh
- 1.6.7 Ensure system wide crypto policy disables EtM for ssh
- 1.7.1 Ensure message of the day is configured properly
- 1.7.2 Ensure local login warning banner is configured properly
- 1.7.3 Ensure remote login warning banner is configured properly
- 1.8.2 Ensure GDM login banner is configured
- 1.8.3 Ensure GDM disable-user-list option is enabled
- 1.8.4 Ensure GDM screen locks when the user is idle
- 1.8.5 Ensure GDM screen locks cannot be overridden
- 1.8.6 Ensure GDM automatic mounting of removable media is disabled
- 1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden
- 1.8.8 Ensure GDM autorun-never is enabled
- 1.8.9 Ensure GDM autorun-never is not overridden
- 2.3.2 Ensure chrony is configured
- 2.4.1.1 Ensure cron daemon is enabled and active
- 2.4.2.1 Ensure at is restricted to authorized users
- 3.1.2 Ensure wireless interfaces are disabled
- 3.3.1 Ensure ip forwarding is disabled
- 3.3.10 Ensure tcp syn cookies is enabled
- 3.3.11 Ensure ipv6 router advertisements are not accepted
- 3.3.2 Ensure packet redirect sending is disabled
- 3.3.3 Ensure bogus icmp responses are ignored
- 3.3.4 Ensure broadcast icmp requests are ignored
- 3.3.5 Ensure icmp redirects are not accepted
- 3.3.6 Ensure secure icmp redirects are not accepted
- 3.3.7 Ensure reverse path filtering is enabled
- 3.3.8 Ensure source routed packets are not accepted
- 3.3.9 Ensure suspicious packets are logged
- 4.1.2 Ensure a single firewall configuration utility is in use
- 4.2.2 Ensure firewalld loopback traffic is configured
- 4.3.1 Ensure nftables base chains exist
- 4.3.3 Ensure nftables default deny firewall policy
- 4.3.4 Ensure nftables loopback traffic is configured
- 5.1.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 5.1.2 Ensure permissions on SSH private host key files are configured
- 5.1.3 Ensure permissions on SSH public host key files are configured
- 5.1.4 Ensure sshd Ciphers are configured
- 5.1.5 Ensure sshd KexAlgorithms is configured
- 5.1.6 Ensure sshd MACs are configured
- 5.1.8 Ensure sshd Banner is configured
- 5.3.2.2 Ensure pam_faillock module is enabled
- 5.3.2.3 Ensure pam_pwquality module is enabled
- 5.3.2.4 Ensure pam_pwhistory module is enabled
- 5.3.2.5 Ensure pam_unix module is enabled
- 5.3.3.1.1 Ensure password failed attempts lockout is configured
- 5.3.3.1.2 Ensure password unlock time is configured
- 5.3.3.2.1 Ensure password number of changed characters is configured
- 5.3.3.2.2 Ensure password length is configured
- 5.3.3.2.3 Ensure password complexity is configured
- 5.3.3.2.4 Ensure password same consecutive characters is configured
- 5.3.3.2.5 Ensure password maximum sequential characters is configured
- 5.3.3.2.6 Ensure password dictionary check is enabled
- 5.3.3.2.7 Ensure password quality is enforced for the root user
- 5.3.3.3.1 Ensure password history remember is configured
- 5.3.3.3.3 Ensure pam_pwhistory includes use_authtok
- 5.3.3.4.1 Ensure pam_unix does not include nullok
- 5.3.3.4.2 Ensure pam_unix does not include remember
- 5.3.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
- 5.3.3.4.4 Ensure pam_unix includes use_authtok
- 5.4.1.1 Ensure password expiration is configured
- 5.4.1.3 Ensure password expiration warning days is configured
- 5.4.1.5 Ensure inactive password lock is configured
- 5.4.2.7 Ensure system accounts do not have a valid login shell
- 5.4.2.8 Ensure accounts without a valid login shell are locked
- 5.4.3.2 Ensure default user shell timeout is configured
- 5.4.3.3 Ensure default user umask is configured
- 6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
- 6.2.2.2 Ensure journald ForwardToSyslog is disabled
- 6.2.2.3 Ensure journald Compress is configured
- 6.2.2.4 Ensure journald Storage is configured
- 6.2.3.3 Ensure journald is configured to send logs to rsyslog
- 6.2.4.1 Ensure access to all logfiles has been configured
- 7.1.11 Ensure world writable files and directories are secured
- 7.2.8 Ensure local interactive user home directories are configured
- 7.2.9 Ensure local interactive user dot files access is configured
Miscellaneous- Metadata updated.
- Variables updated.
|
Aug 1, 2025 Functional Update- 1.4.1 Ensure bootloader password is set
|
Jul 11, 2025 Functional Update- 5.1.2 Ensure permissions on SSH private host key files are configured
- 5.2.2 Ensure sudo commands use pty
- 5.2.3 Ensure sudo log file exists
|
Jun 27, 2025 Functional Update- 2.1.18 Ensure web server services are not in use
- 2.1.8 Ensure message access server services are not in use
|
Mar 22, 2025 Functional Update- 7.1.12 Ensure no files or directories without an owner and a group exist
|
Jan 29, 2025 Functional Update- 1.2.2.1 Ensure updates, patches, and additional security software are installed
|
Jan 6, 2025 Informational Update- 1.1.1.1 Ensure cramfs kernel module is not available
- 1.1.1.2 Ensure freevxfs kernel module is not available
- 1.1.1.3 Ensure hfs kernel module is not available
- 1.1.1.4 Ensure hfsplus kernel module is not available
- 1.1.1.5 Ensure jffs2 kernel module is not available
- 1.1.1.8 Ensure usb-storage kernel module is not available
- 1.1.1.9 Ensure unused filesystems kernel modules are not available
- 1.3.1.2 Ensure SELinux is not disabled in bootloader configuration
- 1.4.2 Ensure access to bootloader config is configured
- 1.5.3 Ensure core dump backtraces are disabled
- 1.5.4 Ensure core dump storage is disabled
- 1.8.2 Ensure GDM login banner is configured
- 1.8.5 Ensure GDM screen locks cannot be overridden
- 1.8.6 Ensure GDM automatic mounting of removable media is disabled
- 1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden
- 1.8.8 Ensure GDM autorun-never is enabled
- 1.8.9 Ensure GDM autorun-never is not overridden
- 2.4.1.8 Ensure crontab is restricted to authorized users
- 2.4.2.1 Ensure at is restricted to authorized users
- 3.1.2 Ensure wireless interfaces are disabled
- 4.1.2 Ensure a single firewall configuration utility is in use
- 4.2.2 Ensure firewalld loopback traffic is configured
- 4.3.2 Ensure nftables established connections are configured
- 4.3.4 Ensure nftables loopback traffic is configured
- 5.1.2 Ensure permissions on SSH private host key files are configured
- 5.1.3 Ensure permissions on SSH public host key files are configured
- 5.3.3.2.1 Ensure password number of changed characters is configured
- 5.3.3.2.2 Ensure password length is configured
- 5.3.3.2.3 Ensure password complexity is configured
- 5.3.3.2.4 Ensure password same consecutive characters is configured
- 5.3.3.2.5 Ensure password maximum sequential characters is configured
- 5.3.3.2.6 Ensure password dictionary check is enabled
- 5.3.3.3.3 Ensure pam_pwhistory includes use_authtok
- 5.3.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
- 5.3.3.4.4 Ensure pam_unix includes use_authtok
- 5.4.2.7 Ensure system accounts do not have a valid login shell
- 5.4.2.8 Ensure accounts without a valid login shell are locked
- 5.4.3.3 Ensure default user umask is configured
- 6.2.2.2 Ensure journald ForwardToSyslog is disabled
- 6.2.2.3 Ensure journald Compress is configured
- 6.2.2.4 Ensure journald Storage is configured
- 6.2.3.3 Ensure journald is configured to send logs to rsyslog
- 6.2.4.1 Ensure access to all logfiles has been configured
- 7.1.10 Ensure permissions on /etc/security/opasswd are configured
- 7.1.11 Ensure world writable files and directories are secured
- 7.2.8 Ensure local interactive user home directories are configured
- 7.2.9 Ensure local interactive user dot files access is configured
|
Nov 6, 2024 Functional Update- 7.1.11 Ensure world writable files and directories are secured
- 7.1.12 Ensure no files or directories without an owner and a group exist
- 7.1.13 Ensure SUID and SGID files are reviewed
|
Nov 4, 2024 Functional Update- 6.1.2 Ensure filesystem integrity is regularly checked
|