CIS Amazon Linux 2 STIG v2.0.0 L1 Workstation

Audit Details

Name: CIS Amazon Linux 2 STIG v2.0.0 L1 Workstation

Updated: 11/25/2025

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 201

File Details

Filename: CIS_Amazon_Linux_2_STIG_v2.0.0_L1_Workstation.audit

Size: 798 kB

MD5: ad5cbbe8b6ec19fe1d3d80b3b43908cb
SHA256: 6dde3cbd2b08d345e31bb0c1d1991c70f44ed890b29807724b15ebbc9425f792

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.1.3 Ensure mounting of udf filesystems is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.2 Ensure /tmp is configured

CONFIGURATION MANAGEMENT

1.1.3 Ensure noexec option set on /tmp partition

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.4 Ensure nodev option set on /tmp partition

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.5 Ensure nosuid option set on /tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.6 Ensure /dev/shm is configured

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.7 Ensure noexec option set on /dev/shm partition

CONFIGURATION MANAGEMENT

1.1.8 Ensure nodev option set on /dev/shm partition

CONFIGURATION MANAGEMENT

1.1.9 Ensure nosuid option set on /dev/shm partition

CONFIGURATION MANAGEMENT

1.1.12 Ensure /var/tmp partition includes the noexec option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.13 Ensure /var/tmp partition includes the nodev option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.14 Ensure /var/tmp partition includes the nosuid option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.18 Ensure /home partition includes the nodev option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.20 Ensure removable media partitions include noexec option

ACCESS CONTROL, MEDIA PROTECTION

1.1.21 Ensure nodev option set on removable media partitions

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.22 Ensure nosuid option set on removable media partitions

CONFIGURATION MANAGEMENT

1.1.25 Ensure sticky bit is set on all world-writable directories

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.2.1 Ensure GPG keys are configured

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure package manager repositories are configured

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activated

CONFIGURATION MANAGEMENT

1.3.1 Ensure AIDE is installed

CONFIGURATION MANAGEMENT

1.3.2 Ensure filesystem integrity is regularly checked

CONFIGURATION MANAGEMENT

1.4.2 Ensure permissions on bootloader config are configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4.3 Ensure authentication required for single user mode

ACCESS CONTROL

1.5.1 Ensure core dumps are restricted

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.2 Ensure XD/NX support is enabled

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled

CONFIGURATION MANAGEMENT

1.5.4 Ensure prelink is not installed

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.6.1.1 Ensure SELinux is installed

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure SELinux is not disabled in bootloader configuration

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configured

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.6.1.4 Ensure the SELinux mode is enforcing or permissive

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.6 Ensure no unconfined services exist

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.8 Ensure the MCS Translation Service (mcstrans) is not installed

CONFIGURATION MANAGEMENT

1.7.1 Ensure message of the day is configured properly

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.2 Ensure local login warning banner is configured properly

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.4 Ensure remote login warning banner is configured properly

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.5 Ensure permissions on /etc/motd are configured

ACCESS CONTROL, MEDIA PROTECTION

1.7.6 Ensure permissions on /etc/issue are configured

ACCESS CONTROL, MEDIA PROTECTION

1.7.7 Ensure permissions on /etc/issue.net are configured

ACCESS CONTROL, MEDIA PROTECTION

1.9 Ensure updates, patches, and additional security software are installed

CONFIGURATION MANAGEMENT

2.1.1 Ensure xinetd is not installed

CONFIGURATION MANAGEMENT

2.2.1.1 Ensure time synchronization is in use

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure chrony is configured

AUDIT AND ACCOUNTABILITY

2.2.1.3 Ensure ntp is configured

AUDIT AND ACCOUNTABILITY

2.2.5 Ensure DHCP Server is not installed

CONFIGURATION MANAGEMENT

2.2.6 Ensure LDAP server is not installed

CONFIGURATION MANAGEMENT

2.2.7 Ensure DNS Server is not installed

CONFIGURATION MANAGEMENT

2.2.8 Ensure FTP Server is not installed

CONFIGURATION MANAGEMENT