CIS CentOS 7 v3.1.2 Workstation L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS CentOS 7 v3.1.2 Workstation L1

Updated: 4/12/2024

Authority: CIS

Plugin: Unix

Revision: 1.27

Estimated Item Count: 320

File Details

Filename: CIS_CentOS_7_v3.1.2_Workstation_L1.audit

Size: 747 kB

MD5: 9009487e3ba6ede46e4ac4980565cad9
SHA256: 49743353da6ac94e27abe4efc702ba4a8c480b7f6ed28d8be1a13136f65b2489

Audit Changelog

 
Revision 1.27

Apr 12, 2024

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.26

Feb 12, 2024

Functional Update
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • Metadata updated.
Revision 1.25

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.24

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.23

Oct 3, 2023

Functional Update
  • 1.8.3 Ensure last logged in user display is disabled - disable user list
Informational Update
  • 5.5.5 Ensure default user umask is configured - system wide default
  • 5.5.5 Ensure default user umask is configured - system wide umask
Revision 1.22

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 5.3.2 Ensure permissions on SSH private host key files are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.21

Aug 8, 2023

Functional Update
  • 2.2.13 Ensure net-snmp is not installed
Revision 1.20

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - running
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - imtcp.so
Revision 1.19

Jul 20, 2023

Functional Update
  • 5.5.1.1 Ensure password expiration is 365 days or less - users
  • 5.5.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.5.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.10 Ensure root PATH Integrity
  • 6.2.12 Ensure users own their home directories
  • 6.2.13 Ensure users' home directories permissions are 750 or more restrictive
Revision 1.18

Jun 21, 2023

Functional Update
  • 5.4.2 Ensure lockout for failed password attempts is configured - password-auth
  • 5.4.2 Ensure lockout for failed password attempts is configured - system-auth