1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of squashfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of squashfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.2 Ensure /tmp is configured | CONFIGURATION MANAGEMENT |
1.1.3 Ensure nodev option set on /tmp partition | ACCESS CONTROL |
1.1.4 Ensure nosuid option set on /tmp partition | ACCESS CONTROL |
1.1.5 Ensure noexec option set on /tmp partition | ACCESS CONTROL |
1.1.8 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL |
1.1.9 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL |
1.1.10 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL |
1.1.14 Ensure nodev option set on /home partition | ACCESS CONTROL |
1.1.15 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL |
1.1.16 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL |
1.1.17 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL |
1.1.18 Ensure nodev option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.19 Ensure nosuid option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.20 Ensure noexec option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.21 Ensure sticky bit is set on all world-writable directories | ACCESS CONTROL |
1.2.1 Ensure GPG keys are configured | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure gpgcheck is globally activated | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure package manager repositories are configured | SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure sudo is installed | CONFIGURATION MANAGEMENT |
1.3.2 Ensure sudo commands use pty | ACCESS CONTROL |
1.3.3 Ensure sudo log file exists | AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure AIDE is installed | CONFIGURATION MANAGEMENT |
1.4.2 Ensure filesystem integrity is regularly checked | |
1.5.1 Ensure permissions on bootloader config are configured - /boot/grub2/grub.cfg | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure permissions on bootloader config are configured - /boot/grub2/grubenv | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure bootloader password is set | ACCESS CONTROL |
1.5.3 Ensure authentication required for single user mode - /usr/lib/systemd/system/emergency.service | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure authentication required for single user mode - /usr/lib/systemd/system/rescue.service | SYSTEM AND INFORMATION INTEGRITY |
1.6.1 Ensure core dumps are restricted - /etc/security/limits.d/* | ACCESS CONTROL |
1.6.1 Ensure core dumps are restricted - /etc/sysctl.d/* | ACCESS CONTROL |
1.6.1 Ensure core dumps are restricted - sysctl | ACCESS CONTROL |
1.6.2 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctl.d/* | SYSTEM AND INFORMATION INTEGRITY |
1.6.2 Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND INFORMATION INTEGRITY |
1.8.1.1 Ensure message of the day is configured properly | CONFIGURATION MANAGEMENT |
1.8.1.2 Ensure local login warning banner is configured properly | CONFIGURATION MANAGEMENT |
1.8.1.3 Ensure remote login warning banner is configured properly | CONFIGURATION MANAGEMENT |
1.8.1.4 Ensure permissions on /etc/motd are configured | CONFIGURATION MANAGEMENT |
1.8.1.5 Ensure permissions on /etc/issue are configured | CONFIGURATION MANAGEMENT |
1.8.1.6 Ensure permissions on /etc/issue.net are configured | CONFIGURATION MANAGEMENT |
1.8.2 Ensure GDM login banner is configured - banner message enabled | ACCESS CONTROL |
1.8.2 Ensure GDM login banner is configured - banner message text | ACCESS CONTROL |
1.9 Ensure updates, patches, and additional security software are installed | SYSTEM AND INFORMATION INTEGRITY |
1.10 Ensure system-wide crypto policy is not legacy | CONFIGURATION MANAGEMENT |
2.1.1 Ensure xinetd is not installed | CONFIGURATION MANAGEMENT |