Name: CIS Amazon Linux 2 v2.0.0 L1
Updated: 8/24/2023
Authority: CIS
Plugin: Unix
Revision: 1.24
Estimated Item Count: 316
Filename: CIS_Amazon_Linux_2_v2.0.0_L1.audit
Size: 983 kB
Description | Categories |
---|---|
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.3 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.3 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.2 Ensure /tmp is configured | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.3 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.4 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.5 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.6 Ensure /dev/shm is configured - fstab | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.6 Ensure /dev/shm is configured - mount | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.7 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.8 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.9 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.12 Ensure /var/tmp partition includes the noexec option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.13 Ensure /var/tmp partition includes the nodev option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.14 Ensure /var/tmp partition includes the nosuid option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.18 Ensure /home partition includes the nodev option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.19 Ensure removable media partitions include noexec option | ACCESS CONTROL, MEDIA PROTECTION |
1.1.20 Ensure nodev option set on removable media partitions | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.21 Ensure nosuid option set on removable media partitions | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.22 Ensure sticky bit is set on all world-writable directories | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.23 Disable Automounting | MEDIA PROTECTION |
1.1.24 Disable USB Storage - lsmod | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.24 Disable USB Storage - modprobe | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.2.1 Ensure GPG keys are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure gpgcheck is globally activated | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure permissions on bootloader config are configured - grub.cfg | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.1 Ensure permissions on bootloader config are configured - user.cfg | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.2 Ensure authentication required for single user mode - emergency.service | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.2 Ensure authentication required for single user mode - rescue.service | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - /etc/sysctl.conf, /etc/sysctl.d/* | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - coredump.service | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - limits.conf, limits.d/* | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - sysctl | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.2 Ensure XD/NX support is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.4 Ensure prelink is not installed | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.6.1.1 Ensure SELinux is installed | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - config | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - sestatus | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - config | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.6 Ensure no unconfined services exist | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.7 Ensure SETroubleshoot is not installed | CONFIGURATION MANAGEMENT |
1.6.1.8 Ensure the MCS Translation Service (mcstrans) is not installed | CONFIGURATION MANAGEMENT |