| Sep 3, 2025 Functional Update3.1.2 Ensure SCTP is disabled
 | 
| Jan 6, 2025 Informational Update4.1.3.10 Ensure successful file system mounts are collected4.1.3.13 Ensure file deletion events by users are collected4.1.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recorded4.1.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recorded4.1.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recorded4.1.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recorded4.1.3.19 Ensure kernel module loading unloading and modification is collected4.1.3.3 Ensure events that modify the sudo log file are collected4.1.3.6 Ensure use of privileged commands are collected4.1.3.7 Ensure unsuccessful file access attempts are collected4.1.3.9 Ensure discretionary access control permission modification events are collected
MiscellaneousMetadata updated.References updated.
 | 
| Jun 17, 2024 | 
| Jun 6, 2024 Functional Update1.1.3.1 Ensure separate partition exists for /var1.1.4.1 Ensure separate partition exists for /var/tmp1.1.5.1 Ensure separate partition exists for /var/log1.1.6.1 Ensure separate partition exists for /var/log/audit1.1.7.1 Ensure separate partition exists for /home1.1.9 Disable Automounting1.8.5 Ensure automatic mounting of removable media is disabled4.1.1.1 Ensure auditd is installed4.1.1.2 Ensure auditd service is enabled4.1.1.4 Ensure audit_backlog_limit is sufficient4.1.2.1 Ensure audit log storage size is configured4.1.2.2 Ensure audit logs are not automatically deleted4.1.3.20 Ensure the audit configuration is immutable4.1.3.21 Ensure the running and on disk configuration is the same4.1.3.6 Ensure use of privileged commands are collected5.3.4 Ensure users must provide password for escalation6.1.1 Audit system file permissions
Informational Update1.1.3.1 Ensure separate partition exists for /var1.1.4.1 Ensure separate partition exists for /var/tmp1.1.5.1 Ensure separate partition exists for /var/log1.1.6.1 Ensure separate partition exists for /var/log/audit1.1.7.1 Ensure separate partition exists for /home1.1.9 Disable Automounting1.8.5 Ensure automatic mounting of removable media is disabled4.1.1.1 Ensure auditd is installed4.1.1.2 Ensure auditd service is enabled4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled4.1.1.4 Ensure audit_backlog_limit is sufficient4.1.2.1 Ensure audit log storage size is configured4.1.2.2 Ensure audit logs are not automatically deleted4.1.3.20 Ensure the audit configuration is immutable4.1.3.21 Ensure the running and on disk configuration is the same4.1.3.6 Ensure use of privileged commands are collected5.3.4 Ensure users must provide password for escalation6.1.1 Audit system file permissions
MiscellaneousMetadata updated.References updated.Variables updated.
Added1.1.1.2 Ensure mounting of squashfs filesystems is disabled1.1.1.3 Ensure mounting of udf filesystems is disabled1.1.10 Disable USB Storage1.6.1.5 Ensure the SELinux mode is enforcing2.2.3 Ensure Avahi Server is not installed3.1.2 Ensure SCTP is disabled3.1.3 Ensure DCCP is disabled4.1.2.3 Ensure system is disabled when audit logs are full4.1.3.1 Ensure changes to system administration scope (sudoers) is collected4.1.3.10 Ensure successful file system mounts are collected4.1.3.11 Ensure session initiation information is collected4.1.3.12 Ensure login and logout events are collected4.1.3.13 Ensure file deletion events by users are collected4.1.3.14 Ensure events that modify the system's Mandatory Access Controls are collected4.1.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recorded4.1.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recorded4.1.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recorded4.1.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recorded4.1.3.19 Ensure kernel module loading unloading and modification is collected4.1.3.2 Ensure actions as another user are always logged4.1.3.3 Ensure events that modify the sudo log file are collected4.1.3.4 Ensure events that modify date and time information are collected4.1.3.5 Ensure events that modify the system's network environment are collected4.1.3.7 Ensure unsuccessful file access attempts are collected4.1.3.8 Ensure events that modify user/group information are collected4.1.3.9 Ensure discretionary access control permission modification events are collected5.2.13 Ensure SSH AllowTcpForwarding is disabled
 | 
| Mar 18, 2024 Functional Update4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled
MiscellaneousMetadata updated.Variables updated.
Added4.1.3.6 Ensure use of privileged commands are collected
Removed4.1.3.6 Ensure use of privileged commands are collected - /etc/audit/rules.d4.1.3.6 Ensure use of privileged commands are collected - auditctl
 | 
| Dec 27, 2023 Functional Update4.1.3.19 Ensure kernel module loading unloading and modification is collected - kmod symlinks
 | 
| Nov 17, 2023 Functional Update5.2.13 Ensure SSH AllowTcpForwarding is disabled - sshd output
 | 
| Sep 13, 2023 Functional Update4.1.3.3 Ensure events that modify the sudo log file are collected - /etc/audit/rules.d/*.rules4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl
 | 
| Jul 13, 2023 Functional Update4.1.3.2 Ensure actions as another user are always logged - auditctl b324.1.3.2 Ensure actions as another user are always logged - auditctl b64
 | 
| Jul 5, 2023 Functional Update4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = email4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = root
 |