CIS Amazon Linux 2 STIG v2.0.0 STIG

Audit Details

Name: CIS Amazon Linux 2 STIG v2.0.0 STIG

Updated: 11/25/2025

Authority: CIS

Plugin: Unix

Revision: 1.3

Estimated Item Count: 207

File Details

Filename: CIS_Amazon_Linux_2_STIG_v2.0.0_STIG.audit

Size: 824 kB

MD5: 75c36071451909c2f3011fa845055e0f
SHA256: 2f0d9c42983e86f05be5542b2d40f9f2f6ab1639d580a906fedad867cf4db163

Audit Changelog

 
Revision 1.3

Nov 25, 2025

Informational Update
  • 1.1.16 Ensure separate partition exists for /var/log/audit
  • 1.1.2 Ensure /tmp is configured
  • 1.1.28 Disable USB Storage
  • 1.2.3 Ensure gpgcheck is globally activated
  • 1.4.1 Ensure bootloader password is set
  • 1.4.3 Ensure authentication required for single user mode
  • 1.8.1 Ensure GDM login banner is configured
  • 1.8.11 Ensure the screensaver idle-activation-enabled setting
  • 1.8.7 Ensure screensaver lock-enabled is set
  • 1.8.8 Ensure overriding the screensaver lock-delay setting is prevented
  • 1.8.9 Ensure session idle-delay settings is enforced
  • 2.2.24 Ensure NFS is configured to use RPCSEC_GSS
  • 3.5.1.5 Ensure firewalld default zone is set
  • 3.5.3.2.3 Ensure iptables rules exist for all open ports
  • 4.1.2.13 Ensure off-loaded audit logs are labeled.
  • 4.1.2.3 Ensure audit system is set to single when the disk is full.
  • 4.1.2.6 Ensure audit system action is defined for sending errors
  • 4.1.3.10 Ensure use of privileged commands is collected
  • 4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected
  • 4.1.3.12 Ensure discretionary access control permission modification events are collected
  • 4.1.3.13 Ensure login and logout events are collected
  • 4.1.3.14 Ensure events that modify user/group information are collected
  • 4.1.3.7 Ensure kernel module loading and unloading is collected
  • 4.1.3.8 Ensure changes to system administration scope (sudoers) is collected
  • 4.1.3.9 Ensure file deletion events by users are collected
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts.
  • 5.1.8 Ensure cron is restricted to authorized users
  • 5.3.10 Ensure SSH IgnoreRhosts is enabled
  • 5.3.11 Ensure SSH HostbasedAuthentication is disabled
  • 5.3.14 Ensure SSH PermitUserEnvironment is disabled
  • 5.3.17 Ensure only strong MAC algorithms are used
  • 5.3.19 Ensure SSH Idle Timeout Interval is configured
  • 5.3.26 Ensure RSA rhosts authentication is not allowed
  • 5.3.28 Ensure SSH IgnoreUserKnownHosts is enabled
  • 5.3.36 Ensure no \".shosts\" files exist on the system
  • 5.3.4 Ensure permissions on SSH private host key files are configured
  • 5.3.8 Ensure SSH X11 forwarding is disabled
  • 5.4.1 Ensure password creation requirements are configured
  • 5.4.10 Ensure certificate status checking for PKI authentication
  • 5.4.3 Ensure password hashing algorithm is SHA-512
  • 5.4.8 Ensure date and time of last successful logon
  • 5.4.9 Ensure multifactor authentication for access to privileged accounts
  • 5.5.4 Ensure default user shell timeout is configured
  • 5.5.7 Ensure multi-factor authentication is enable for users
  • 6.1.1 Audit system file permissions
  • 6.2.19 Ensure all local interactive user home directories are group-owned
  • 6.2.20 Ensure that all files and directories contained in local interactive user home directories are owned by the user
  • 6.2.21 Ensure local interactive user is a member of the group owner.
  • 6.2.22 Ensure users' files and directories within the home directory permissions are 750 or more restrictive
  • 6.2.23 Ensure local interactive users' dot files for are owned by the user or root.
  • 6.2.24 Ensure local interactive users' dot files are group-owned by the users group or root.
  • 6.2.25 Ensure users' dot files have 0740 or less set.
  • 6.2.26 Ensure local interactive users' dot files executable paths resolve to the users home directory.
  • 6.2.3 Ensure all groups in /etc/passwd exist in /etc/group
Miscellaneous
  • Metadata updated.
  • Platform check updated.
  • References updated.
  • Variables updated.
Added
  • CIS_Amazon_Linux_2_STIG_v2.0.0_STIG.audit from CIS Amazon Linux 2 STIG v2.0.0
Removed
  • CIS_Amazon_Linux_2_STIG_v2.0.0_STIG.audit from CIS Amazon Linux 2 STIG Benchmark v2.0.0
Revision 1.2

Oct 30, 2025

Functional Update
  • 5.3.8 Ensure SSH X11 forwarding is disabled
Revision 1.1

Sep 23, 2025

Functional Update
  • 4.1.3.7 Ensure kernel module loading and unloading is collected