Oct 31, 2025 Functional Update- 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 4.2.10 Ensure SSH PermitUserEnvironment is disabled
- 4.2.11 Ensure SSH IgnoreRhosts is enabled
- 4.2.14 Ensure system-wide crypto policy is not over-ridden
- 4.2.16 Ensure SSH MaxAuthTries is set to 4 or less
- 4.2.17 Ensure SSH MaxStartups is configured
- 4.2.18 Ensure SSH MaxSessions is set to 10 or less
- 4.2.19 Ensure SSH LoginGraceTime is set to one minute or less
- 4.2.2 Ensure permissions on SSH private host key files are configured
- 4.2.3 Ensure permissions on SSH public host key files are configured
- 4.2.4 Ensure SSH access is limited
- 4.2.5 Ensure SSH LogLevel is appropriate
- 4.2.7 Ensure SSH root login is disabled
- 4.2.8 Ensure SSH HostbasedAuthentication is disabled
- 4.2.9 Ensure SSH PermitEmptyPasswords is disabled
- 4.3.4 Ensure re-authentication for privilege escalation is not disabled globally
- 4.5.1 Ensure password creation requirements are configured
- 5.1.1.3 Ensure journald is configured to send logs to rsyslog
- 5.1.1.5 Ensure logging is configured
- 5.1.2.3 Ensure journald is configured to compress large log files
- 5.1.2.4 Ensure journald is configured to write logfiles to persistent disk
Informational Update- 1.1.1.3 Ensure mounting of cramfs filesystems is disabled
- 1.1.1.4 Ensure mounting of freevxfs filesystems is disabled
- 1.1.1.5 Ensure mounting of jffs2 filesystems is disabled
- 1.1.1.6 Ensure mounting of hfs filesystems is disabled
- 1.1.1.7 Ensure mounting of hfsplus filesystems is disabled
- 1.1.2.1 Ensure /tmp is a separate partition
- 1.1.2.2 Ensure nodev option set on /tmp partition
- 1.1.2.3 Ensure noexec option set on /tmp partition
- 1.1.2.4 Ensure nosuid option set on /tmp partition
- 1.1.3.2 Ensure nodev option set on /var partition
- 1.1.3.3 Ensure nosuid option set on /var partition
- 1.1.4.2 Ensure noexec option set on /var/tmp partition
- 1.1.4.3 Ensure nosuid option set on /var/tmp partition
- 1.1.4.4 Ensure nodev option set on /var/tmp partition
- 1.1.5.2 Ensure nodev option set on /var/log partition
- 1.1.5.3 Ensure noexec option set on /var/log partition
- 1.1.5.4 Ensure nosuid option set on /var/log partition
- 1.1.6.2 Ensure noexec option set on /var/log/audit partition
- 1.1.6.3 Ensure nodev option set on /var/log/audit partition
- 1.1.6.4 Ensure nosuid option set on /var/log/audit partition
- 1.1.7.2 Ensure nodev option set on /home partition
- 1.1.7.3 Ensure nosuid option set on /home partition
- 1.1.8.1 Ensure /dev/shm is a separate partition
- 1.1.9 Ensure usb-storage is disabled
- 1.2.2 Ensure gpgcheck is globally activated
- 1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
- 1.4.1 Ensure permissions on bootloader config are configured
- 1.5.1 Ensure address space layout randomization (ASLR) is enabled
- 1.5.2 Ensure ptrace_scope is restricted
- 1.6.1.2 Ensure SELinux is not disabled in bootloader configuration
- 1.7.1 Ensure message of the day is configured properly
- 1.7.2 Ensure local login warning banner is configured properly
- 1.7.3 Ensure remote login warning banner is configured properly
- 2.1.2 Ensure chrony is configured
- 2.2.12 Ensure net-snmp is not installed or the snmpd service is not enabled
- 3.2.1 Ensure IP forwarding is disabled
- 3.2.2 Ensure packet redirect sending is disabled
- 3.3.1 Ensure source routed packets are not accepted
- 3.3.2 Ensure ICMP redirects are not accepted
- 3.3.3 Ensure secure ICMP redirects are not accepted
- 3.3.4 Ensure suspicious packets are logged
- 3.3.5 Ensure broadcast ICMP requests are ignored
- 3.3.6 Ensure bogus ICMP responses are ignored
- 3.3.7 Ensure Reverse Path Filtering is enabled
- 3.3.8 Ensure TCP SYN Cookies is enabled
- 3.3.9 Ensure IPv6 router advertisements are not accepted
- 4.1.7 Ensure permissions on /etc/cron.d are configured
- 4.1.8 Ensure cron is restricted to authorized users
- 4.1.9 Ensure at is restricted to authorized users
- 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 4.2.10 Ensure SSH PermitUserEnvironment is disabled
- 4.2.11 Ensure SSH IgnoreRhosts is enabled
- 4.2.14 Ensure system-wide crypto policy is not over-ridden
- 4.2.16 Ensure SSH MaxAuthTries is set to 4 or less
- 4.2.17 Ensure SSH MaxStartups is configured
- 4.2.18 Ensure SSH MaxSessions is set to 10 or less
- 4.2.19 Ensure SSH LoginGraceTime is set to one minute or less
- 4.2.2 Ensure permissions on SSH private host key files are configured
- 4.2.20 Ensure SSH Idle Timeout Interval is configured
- 4.2.3 Ensure permissions on SSH public host key files are configured
- 4.2.5 Ensure SSH LogLevel is appropriate
- 4.2.6 Ensure SSH PAM is enabled
- 4.2.7 Ensure SSH root login is disabled
- 4.2.8 Ensure SSH HostbasedAuthentication is disabled
- 4.2.9 Ensure SSH PermitEmptyPasswords is disabled
- 4.3.1 Ensure sudo is installed
- 4.3.2 Ensure sudo commands use pty
- 4.3.5 Ensure sudo authentication timeout is configured correctly
- 4.3.6 Ensure access to the su command is restricted
- 4.5.1 Ensure password creation requirements are configured
- 4.5.2 Ensure lockout for failed password attempts is configured
- 4.5.3 Ensure password reuse is limited
- 4.5.4 Ensure password hashing algorithm is SHA-512
- 4.6.2 Ensure system accounts are secured
- 4.6.3 Ensure default user shell timeout is 900 seconds or less
- 4.6.5 Ensure default user umask is 027 or more restrictive
- 5.1.1.4 Ensure rsyslog default file permissions are configured
- 5.1.1.5 Ensure logging is configured
- 5.1.1.7 Ensure rsyslog is not configured to receive logs from a remote client
- 5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client
- 5.1.2.2 Ensure journald service is enabled
- 5.1.3 Ensure all logfiles have appropriate permissions and ownership
- 5.3 Ensure logrotate is configured
- 6.1.11 Ensure world writable files and directories are secured
- 6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
- 6.2.10 Ensure local interactive user home directories are configured
- 6.2.11 Ensure local interactive user dot files access is configured
- 6.2.3 Ensure all groups in /etc/passwd exist in /etc/group
- 6.2.6 Ensure no duplicate user names exist
- 6.2.7 Ensure no duplicate group names exist
Miscellaneous- Metadata updated.
- Variables updated.
|
Oct 14, 2025 Functional Update- 4.2.6 Ensure SSH PAM is enabled
|
Jun 16, 2025 Functional Update- 2.1.2 Ensure chrony is configured
|
Jun 11, 2025 Functional Update- 4.3.2 Ensure sudo commands use pty
|
Jan 6, 2025 Informational Update- 1.1.1.3 Ensure mounting of cramfs filesystems is disabled
- 1.1.1.4 Ensure mounting of freevxfs filesystems is disabled
- 1.1.1.5 Ensure mounting of jffs2 filesystems is disabled
- 1.1.1.6 Ensure mounting of hfs filesystems is disabled
- 1.1.1.7 Ensure mounting of hfsplus filesystems is disabled
- 1.1.9 Ensure usb-storage is disabled
- 1.4.1 Ensure permissions on bootloader config are configured
- 1.6.1.2 Ensure SELinux is not disabled in bootloader configuration
- 4.1.8 Ensure cron is restricted to authorized users
- 4.1.9 Ensure at is restricted to authorized users
- 4.2.2 Ensure permissions on SSH private host key files are configured
- 4.2.3 Ensure permissions on SSH public host key files are configured
- 4.6.2 Ensure system accounts are secured
- 5.1.3 Ensure all logfiles have appropriate permissions and ownership
- 6.1.11 Ensure world writable files and directories are secured
- 6.2.10 Ensure local interactive user home directories are configured
- 6.2.11 Ensure local interactive user dot files access is configured
|
Nov 6, 2024 Functional Update- 6.1.11 Ensure world writable files and directories are secured
- 6.1.12 Ensure no unowned or ungrouped files or directories exist
- 6.1.13 Ensure SUID and SGID files are reviewed
|
Nov 4, 2024 Functional Update- 1.3.2 Ensure filesystem integrity is regularly checked
|
Aug 26, 2024 Functional Update- 4.6.6 Ensure root password is set
|
Jul 31, 2024 |
Jul 19, 2024 Functional Update- 4.6.2 Ensure system accounts are secured
|