Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Amazon Linux 2023 v1.0.0 L1 Server
Changelog
Revision 1.21
Changelog
Revision 1.21
Oct 31, 2025
Functional Update
4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
4.2.10 Ensure SSH PermitUserEnvironment is disabled
4.2.11 Ensure SSH IgnoreRhosts is enabled
4.2.14 Ensure system-wide crypto policy is not over-ridden
4.2.16 Ensure SSH MaxAuthTries is set to 4 or less
4.2.17 Ensure SSH MaxStartups is configured
4.2.18 Ensure SSH MaxSessions is set to 10 or less
4.2.19 Ensure SSH LoginGraceTime is set to one minute or less
4.2.2 Ensure permissions on SSH private host key files are configured
4.2.3 Ensure permissions on SSH public host key files are configured
4.2.4 Ensure SSH access is limited
4.2.5 Ensure SSH LogLevel is appropriate
4.2.7 Ensure SSH root login is disabled
4.2.8 Ensure SSH HostbasedAuthentication is disabled
4.2.9 Ensure SSH PermitEmptyPasswords is disabled
4.3.4 Ensure re-authentication for privilege escalation is not disabled globally
4.5.1 Ensure password creation requirements are configured
5.1.1.3 Ensure journald is configured to send logs to rsyslog
5.1.1.5 Ensure logging is configured
5.1.2.3 Ensure journald is configured to compress large log files
5.1.2.4 Ensure journald is configured to write logfiles to persistent disk
Informational Update
1.1.1.3 Ensure mounting of cramfs filesystems is disabled
1.1.1.4 Ensure mounting of freevxfs filesystems is disabled
1.1.1.5 Ensure mounting of jffs2 filesystems is disabled
1.1.1.6 Ensure mounting of hfs filesystems is disabled
1.1.1.7 Ensure mounting of hfsplus filesystems is disabled
1.1.2.1 Ensure /tmp is a separate partition
1.1.2.2 Ensure nodev option set on /tmp partition
1.1.2.3 Ensure noexec option set on /tmp partition
1.1.2.4 Ensure nosuid option set on /tmp partition
1.1.3.2 Ensure nodev option set on /var partition
1.1.3.3 Ensure nosuid option set on /var partition
1.1.4.2 Ensure noexec option set on /var/tmp partition
1.1.4.3 Ensure nosuid option set on /var/tmp partition
1.1.4.4 Ensure nodev option set on /var/tmp partition
1.1.5.2 Ensure nodev option set on /var/log partition
1.1.5.3 Ensure noexec option set on /var/log partition
1.1.5.4 Ensure nosuid option set on /var/log partition
1.1.6.2 Ensure noexec option set on /var/log/audit partition
1.1.6.3 Ensure nodev option set on /var/log/audit partition
1.1.6.4 Ensure nosuid option set on /var/log/audit partition
1.1.7.2 Ensure nodev option set on /home partition
1.1.7.3 Ensure nosuid option set on /home partition
1.1.8.1 Ensure /dev/shm is a separate partition
1.1.9 Ensure usb-storage is disabled
1.2.2 Ensure gpgcheck is globally activated
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
1.4.1 Ensure permissions on bootloader config are configured
1.5.1 Ensure address space layout randomization (ASLR) is enabled
1.5.2 Ensure ptrace_scope is restricted
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration
1.7.1 Ensure message of the day is configured properly
1.7.2 Ensure local login warning banner is configured properly
1.7.3 Ensure remote login warning banner is configured properly
2.1.2 Ensure chrony is configured
2.2.12 Ensure net-snmp is not installed or the snmpd service is not enabled
3.2.1 Ensure IP forwarding is disabled
3.2.2 Ensure packet redirect sending is disabled
3.3.1 Ensure source routed packets are not accepted
3.3.2 Ensure ICMP redirects are not accepted
3.3.3 Ensure secure ICMP redirects are not accepted
3.3.4 Ensure suspicious packets are logged
3.3.5 Ensure broadcast ICMP requests are ignored
3.3.6 Ensure bogus ICMP responses are ignored
3.3.7 Ensure Reverse Path Filtering is enabled
3.3.8 Ensure TCP SYN Cookies is enabled
3.3.9 Ensure IPv6 router advertisements are not accepted
4.1.7 Ensure permissions on /etc/cron.d are configured
4.1.8 Ensure cron is restricted to authorized users
4.1.9 Ensure at is restricted to authorized users
4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
4.2.10 Ensure SSH PermitUserEnvironment is disabled
4.2.11 Ensure SSH IgnoreRhosts is enabled
4.2.14 Ensure system-wide crypto policy is not over-ridden
4.2.16 Ensure SSH MaxAuthTries is set to 4 or less
4.2.17 Ensure SSH MaxStartups is configured
4.2.18 Ensure SSH MaxSessions is set to 10 or less
4.2.19 Ensure SSH LoginGraceTime is set to one minute or less
4.2.2 Ensure permissions on SSH private host key files are configured
4.2.20 Ensure SSH Idle Timeout Interval is configured
4.2.3 Ensure permissions on SSH public host key files are configured
4.2.5 Ensure SSH LogLevel is appropriate
4.2.6 Ensure SSH PAM is enabled
4.2.7 Ensure SSH root login is disabled
4.2.8 Ensure SSH HostbasedAuthentication is disabled
4.2.9 Ensure SSH PermitEmptyPasswords is disabled
4.3.1 Ensure sudo is installed
4.3.2 Ensure sudo commands use pty
4.3.5 Ensure sudo authentication timeout is configured correctly
4.3.6 Ensure access to the su command is restricted
4.5.1 Ensure password creation requirements are configured
4.5.2 Ensure lockout for failed password attempts is configured
4.5.3 Ensure password reuse is limited
4.5.4 Ensure password hashing algorithm is SHA-512
4.6.2 Ensure system accounts are secured
4.6.3 Ensure default user shell timeout is 900 seconds or less
4.6.5 Ensure default user umask is 027 or more restrictive
5.1.1.4 Ensure rsyslog default file permissions are configured
5.1.1.5 Ensure logging is configured
5.1.1.7 Ensure rsyslog is not configured to receive logs from a remote client
5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client
5.1.2.2 Ensure journald service is enabled
5.1.3 Ensure all logfiles have appropriate permissions and ownership
5.3 Ensure logrotate is configured
6.1.11 Ensure world writable files and directories are secured
6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
6.2.10 Ensure local interactive user home directories are configured
6.2.11 Ensure local interactive user dot files access is configured
6.2.3 Ensure all groups in /etc/passwd exist in /etc/group
6.2.6 Ensure no duplicate user names exist
6.2.7 Ensure no duplicate group names exist
Miscellaneous
Metadata updated.
Variables updated.