CIS Debian 10 Server L2 v1.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Debian 10 Server L2 v1.0.0

Updated: 7/24/2023

Authority: CIS

Plugin: Unix

Revision: 1.15

Estimated Item Count: 130

File Details

Filename: CIS_Debian_Linux_10_v1.0.0_L2_Server.audit

Size: 351 kB

MD5: 27a0896c21e8ca319ac5f8f0b91c2240
SHA256: d09c8a99fcc71c6b8072569e12c9018f9a16b310ff0f9649a79aba9dbc8e7a06

Audit Items

DescriptionCategories
1.1.1.7 Ensure mounting of FAT filesystems is limited - /etc/fstab
1.1.1.7 Ensure mounting of FAT filesystems is limited - lsmod
1.1.1.7 Ensure mounting of FAT filesystems is limited - modprobe
1.1.6 Ensure separate partition exists for /var
1.1.7 Ensure separate partition exists for /var/tmp
1.1.11 Ensure separate partition exists for /var/log
1.1.12 Ensure separate partition exists for /var/log/audit
1.1.13 Ensure separate partition exists for /home
1.7.1.4 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded
3.1.1 Disable IPv6
3.4.1 Ensure DCCP is disabled - lsmod
3.4.1 Ensure DCCP is disabled - modprobe
3.4.2 Ensure SCTP is disabled - lsmod
3.4.2 Ensure SCTP is disabled - modprobe
3.4.3 Ensure RDS is disabled - lsmod
3.4.3 Ensure RDS is disabled - modprobe
3.4.4 Ensure TIPC is disabled - lsmod
3.4.4 Ensure TIPC is disabled - modprobe
4.1.1.1 Ensure auditd is installed - audispd-plugins
4.1.1.1 Ensure auditd is installed - auditd
4.1.1.2 Ensure auditd service is enabled
4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled
4.1.1.4 Ensure audit_backlog_limit is sufficient
4.1.2.1 Ensure audit log storage size is configured
4.1.2.2 Ensure audit logs are not automatically deleted
4.1.2.3 Ensure system is disabled when audit logs are full - action_mail_acct
4.1.2.3 Ensure system is disabled when audit logs are full - admin_space_left_action
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action
4.1.3 Ensure events that modify date and time information are collected - /etc/localtime
4.1.3 Ensure events that modify date and time information are collected - adjtimex settimeofday stime
4.1.3 Ensure events that modify date and time information are collected - auditctl /etc/localtime
4.1.3 Ensure events that modify date and time information are collected - auditctl adjtimex
4.1.3 Ensure events that modify date and time information are collected - auditctl clock_settime
4.1.3 Ensure events that modify date and time information are collected - auditctl clock_settime x64
4.1.3 Ensure events that modify date and time information are collected - auditctl settimeofday,adjtimex x64
4.1.3 Ensure events that modify date and time information are collected - clock_settime
4.1.3 Ensure events that modify date and time information are collected - clock_settime x64
4.1.3 Ensure events that modify date and time information are collected - settimeofday,adjtimex x64
4.1.4 Ensure events that modify user/group information are collected - /etc/group
4.1.4 Ensure events that modify user/group information are collected - /etc/gshadow
4.1.4 Ensure events that modify user/group information are collected - /etc/passwd
4.1.4 Ensure events that modify user/group information are collected - /etc/security/opasswd
4.1.4 Ensure events that modify user/group information are collected - /etc/shadow
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/group
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/gshadow
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/passwd
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswd
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadow