CIS CentOS 7 v3.1.2 Server L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS CentOS 7 v3.1.2 Server L1

Updated: 4/12/2024

Authority: CIS

Plugin: Unix

Revision: 1.29

Estimated Item Count: 328

File Details

Filename: CIS_CentOS_7_v3.1.2_Server_L1.audit

Size: 758 kB

MD5: 0ea79f6dd88a1e47e6a7ac14cf14af38
SHA256: 63f9a74aaede838beb6adbae851e55aca486d30c1e7d8ed603ba46f768751568

Audit Changelog

 
Revision 1.29

Apr 12, 2024

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.28

Mar 18, 2024

Functional Update
  • 3.1.2 Ensure wireless interfaces are disabled
Revision 1.27

Feb 12, 2024

Functional Update
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • Metadata updated.
Revision 1.26

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.25

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.24

Oct 3, 2023

Functional Update
  • 1.8.3 Ensure last logged in user display is disabled - disable user list
Informational Update
  • 5.5.5 Ensure default user umask is configured - system wide default
  • 5.5.5 Ensure default user umask is configured - system wide umask
Revision 1.23

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 5.3.2 Ensure permissions on SSH private host key files are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.22

Aug 8, 2023

Functional Update
  • 2.2.13 Ensure net-snmp is not installed
Revision 1.21

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - running
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - imtcp.so
Revision 1.20

Jul 20, 2023

Functional Update
  • 5.5.1.1 Ensure password expiration is 365 days or less - users
  • 5.5.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.5.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.10 Ensure root PATH Integrity
  • 6.2.12 Ensure users own their home directories
  • 6.2.13 Ensure users' home directories permissions are 750 or more restrictive