CIS Amazon Linux 2 STIG v2.0.0 STIG

Audit Details

Name: CIS Amazon Linux 2 STIG v2.0.0 STIG

Updated: 6/24/2025

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 207

File Details

Filename: CIS_Amazon_Linux_2_STIG_v2.0.0_STIG.audit

Size: 886 kB

MD5: 83c7e5daa36ce47b62400420c9da15c8
SHA256: 14ede810329bae0127324478b21e2322f82b40d097113d66c172cc7cf8581d3f

Audit Items

DescriptionCategories
1.1.2 Ensure /tmp is configured

ACCESS CONTROL, MEDIA PROTECTION

1.1.7 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

1.1.8 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.9 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.10 Ensure separate partition exists for /var

ACCESS CONTROL, MEDIA PROTECTION

1.1.16 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY

1.1.19 Ensure nosuid is set on users' home directories.

ACCESS CONTROL, MEDIA PROTECTION

1.1.22 Ensure nosuid option set on removable media partitions

ACCESS CONTROL, MEDIA PROTECTION

1.1.23 Ensure noexec option is configured for NFS.

ACCESS CONTROL, MEDIA PROTECTION

1.1.24 Ensure nosuid option is set for NFS

ACCESS CONTROL, MEDIA PROTECTION

1.1.26 Ensure all world-writable directories are group-owned.

ACCESS CONTROL, MEDIA PROTECTION

1.1.27 Disable Automounting

MEDIA PROTECTION

1.1.28 Disable USB Storage

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.2.3 Ensure gpgcheck is globally activated

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure software packages have been digitally signed by a Certificate Authority (CA)

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Ensure removal of software components after update

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.6 Ensure the version of the operating system is an active vendor supported release

SYSTEM AND SERVICES ACQUISITION

1.3.1 Ensure AIDE is installed

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.3 Ensure AIDE is configured to verify ACLs

ACCESS CONTROL, MEDIA PROTECTION

1.3.4 Ensure AIDE is configured to verify XATTRS

ACCESS CONTROL, MEDIA PROTECTION

1.3.5 Ensure AIDE is configured to use FIPS 140-2

ACCESS CONTROL, MEDIA PROTECTION

1.4.1 Ensure bootloader password is set

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4.3 Ensure authentication required for single user mode

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4.4 Ensure boot loader does not allow removable media

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4.5 Ensure version 7.2 or newer booted with a BIOS have a unique name for the grub superusers account

SYSTEM AND INFORMATION INTEGRITY

1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers account

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled

SYSTEM AND INFORMATION INTEGRITY

1.5.5 Ensure number of concurrent sessions is limited

ACCESS CONTROL

1.5.6 Ensure the Ctrl-Alt-Delete key sequence is disabled.

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.7 Ensure kernel core dumps are disabled.

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.8 Ensure DNS is servers are configured

CONFIGURATION MANAGEMENT

1.5.9 Ensure NIST FIPS-validated cryptography is configured

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1.3 Ensure SELinux policy is configured

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.5 Ensure the SELinux mode is enforcing

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.9 Ensure non-privileged users are prevented from executing privileged functions

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.6.1.10 Ensure system device files are labeled.

ACCESS CONTROL, MEDIA PROTECTION

1.7.3 Ensure the Standard Mandatory DoD Notice and Consent Banner are configured

CONFIGURATION MANAGEMENT

1.7.8 Ensure the Standard Mandatory DoD Notice and Consent Banner are configured

ACCESS CONTROL

1.8.1 Ensure GDM login banner is configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure Standard Mandatory DoD Notice and Consent Banner displayed via a graphical user logon

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.3 Ensure GDM session lock is enabled

ACCESS CONTROL

1.8.4 Ensure the graphical user Ctrl-Alt-Delete key sequence is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.5 Ensure users must authenticate users using MFA via a graphical user logon

IDENTIFICATION AND AUTHENTICATION

1.8.6 Ensure GNOME Screensaver period of inactivity is configured

ACCESS CONTROL

1.8.7 Ensure screensaver lock-enabled is set

ACCESS CONTROL

1.8.8 Ensure overriding the screensaver lock-delay setting is prevented

ACCESS CONTROL

1.8.9 Ensure session idle-delay settings is enforced

ACCESS CONTROL

1.8.10 Ensure GNOME Idle activation is set

ACCESS CONTROL

1.8.11 Ensure the screensaver idle-activation-enabled setting

ACCESS CONTROL