CIS Amazon Linux 2 STIG v2.0.0 L2 Server

Audit Details

Name: CIS Amazon Linux 2 STIG v2.0.0 L2 Server

Updated: 9/19/2025

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 36

File Details

Filename: CIS_Amazon_Linux_2_STIG_v2.0.0_L2_Server.audit

Size: 263 kB

MD5: c425e722857f24b1dafc7663237d08d3
SHA256: 6a73615965186c481d7d14a44fad05a3c560be8c47e0f2302b3f30adbe126fbe

Audit Items

DescriptionCategories
1.1.1.2 Ensure mounting of squashfs filesystems is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.10 Ensure separate partition exists for /var

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 Ensure separate partition exists for /var/tmp

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.15 Ensure separate partition exists for /var/log

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.16 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure separate partition exists for /home

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.6.1.5 Ensure the SELinux mode is enforcing

ACCESS CONTROL, MEDIA PROTECTION

3.1.1 Disable IPv6

CONFIGURATION MANAGEMENT

3.4.1 Ensure DCCP is disabled

CONFIGURATION MANAGEMENT

3.4.2 Ensure SCTP is disabled

CONFIGURATION MANAGEMENT

4.1.1.1 Ensure auditd is installed

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure auditd service is enabled and running

AUDIT AND ACCOUNTABILITY

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure audit log storage size is configured

AUDIT AND ACCOUNTABILITY

4.1.2.2 Ensure audit logs are not automatically deleted

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure system is disabled when audit logs are full

AUDIT AND ACCOUNTABILITY

4.1.2.7 Ensure audit_backlog_limit is sufficient

AUDIT AND ACCOUNTABILITY

4.1.3.1 Ensure events that modify date and time information are collected

AUDIT AND ACCOUNTABILITY

4.1.3.2 Ensure system administrator command executions (sudo) are collected

AUDIT AND ACCOUNTABILITY

4.1.3.3 Ensure session initiation information is collected

AUDIT AND ACCOUNTABILITY

4.1.3.4 Ensure events that modify the system's Mandatory Access Controls are collected

AUDIT AND ACCOUNTABILITY

4.1.3.5 Ensure events that modify the system's network environment are collected

AUDIT AND ACCOUNTABILITY

4.1.3.6 Ensure successful file system mounts are collected

AUDIT AND ACCOUNTABILITY

4.1.3.7 Ensure kernel module loading and unloading is collected

AUDIT AND ACCOUNTABILITY

4.1.3.8 Ensure changes to system administration scope (sudoers) is collected

AUDIT AND ACCOUNTABILITY

4.1.3.9 Ensure file deletion events by users are collected

AUDIT AND ACCOUNTABILITY

4.1.3.10 Ensure use of privileged commands is collected

AUDIT AND ACCOUNTABILITY

4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected

AUDIT AND ACCOUNTABILITY

4.1.3.12 Ensure discretionary access control permission modification events are collected

AUDIT AND ACCOUNTABILITY

4.1.3.13 Ensure login and logout events are collected

AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collected

AUDIT AND ACCOUNTABILITY

4.1.3.41 Ensure the audit configuration is immutable

ACCESS CONTROL, MEDIA PROTECTION

5.3.8 Ensure SSH X11 forwarding is disabled

CONFIGURATION MANAGEMENT

5.3.23 Ensure SSH AllowTcpForwarding is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1.1 Audit system file permissions

ACCESS CONTROL, MEDIA PROTECTION

CIS_Amazon_Linux_2_STIG_v2.0.0_L2_Server.audit from CIS Amazon Linux 2 STIG Benchmark v2.0.0