Oct 31, 2025 Functional Update- 1.1.2.1.2 Ensure nodev option set on /tmp partition
 - 1.1.2.2.1 Ensure /dev/shm is a separate partition
 - 1.1.2.2.2 Ensure nodev option set on /dev/shm partition
 - 1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
 - 1.1.2.2.4 Ensure noexec option set on /dev/shm partition
 - 3.4.2.4 Ensure network interfaces are assigned to appropriate zone
 - 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
 - 4.2.10 Ensure sshd HostbasedAuthentication is disabled
 - 4.2.11 Ensure sshd IgnoreRhosts is enabled
 - 4.2.12 Ensure sshd KexAlgorithms is configured
 - 4.2.13 Ensure sshd LoginGraceTime is configured
 - 4.2.14 Ensure sshd LogLevel is configured
 - 4.2.15 Ensure sshd MACs are configured
 - 4.2.16 Ensure sshd MaxAuthTries is configured
 - 4.2.17 Ensure sshd MaxSessions is configured
 - 4.2.18 Ensure sshd MaxStartups is configured
 - 4.2.19 Ensure sshd PermitEmptyPasswords is disabled
 - 4.2.2 Ensure permissions on SSH private host key files are configured
 - 4.2.20 Ensure sshd PermitRootLogin is disabled
 - 4.2.21 Ensure sshd PermitUserEnvironment is disabled
 - 4.2.22 Ensure sshd UsePAM is enabled
 - 4.2.3 Ensure permissions on SSH public host key files are configured
 - 4.2.4 Ensure sshd access is configured
 - 4.2.5 Ensure sshd Banner is configured
 - 4.2.6 Ensure sshd Ciphers are configured
 - 4.2.7 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
 - 4.3.5 Ensure re-authentication for privilege escalation is not disabled globally
 - 4.5.2.1 Ensure default group for the root account is GID 0
 
 Miscellaneous- Metadata updated.
 - Variables updated.
 
  | 
Aug 5, 2025 Functional Update- 4.3.3 Ensure sudo log file exists
 
  | 
Jun 11, 2025 Functional Update- 4.3.2 Ensure sudo commands use pty
 
  | 
Jan 6, 2025 Informational Update- 1.1.1.1 Ensure cramfs kernel module is not available
 - 1.1.1.2 Ensure freevxfs kernel module is not available
 - 1.1.1.3 Ensure hfs kernel module is not available
 - 1.1.1.4 Ensure hfsplus kernel module is not available
 - 1.1.1.5 Ensure jffs2 kernel module is not available
 - 1.1.1.8 Ensure usb-storage kernel module is not available
 - 3.1.2 Ensure wireless interfaces are disabled
 - 4.1.1.8 Ensure crontab is restricted to authorized users
 - 4.1.2.1 Ensure at is restricted to authorized users
 - 4.2.2 Ensure permissions on SSH private host key files are configured
 - 4.2.3 Ensure permissions on SSH public host key files are configured
 - 4.4.2.2.2 Ensure password number of changed characters is configured
 - 4.4.2.2.7 Ensure password dictionary check is enabled
 - 4.5.2.3 Ensure system accounts are secured
 - 4.5.3.3 Ensure default user umask is configured
 - 5.1.4 Ensure all logfiles have appropriate access configured
 - 6.1.10 Ensure permissions on /etc/security/opasswd are configured
 - 6.1.11 Ensure world writable files and directories are secured
 - 6.2.10 Ensure local interactive user home directories are configured
 - 6.2.11 Ensure local interactive user dot files access is configured
 
  | 
Nov 6, 2024 Functional Update- 6.1.11 Ensure world writable files and directories are secured
 - 6.1.12 Ensure no unowned or ungrouped files or directories exist
 - 6.1.13 Ensure SUID and SGID files are reviewed
 
  | 
Nov 4, 2024 Functional Update- 5.3.2 Ensure filesystem integrity is regularly checked
 
  | 
Aug 26, 2024 Functional Update- 4.5.2.4 Ensure root password is set
 
  | 
Jul 19, 2024 Functional Update- 4.5.2.3 Ensure system accounts are secured
 
  | 
Jun 17, 2024  |