CIS Debian 10 Server L2 v1.0.0

Audit Details

Name: CIS Debian 10 Server L2 v1.0.0

Updated: 1/4/2023

Authority: CIS

Plugin: Unix

Revision: 1.11

Estimated Item Count: 130

File Details

Filename: CIS_Debian_Linux_10_v1.0.0_L2_Server.audit

Size: 388 kB

MD5: 3577bcde6a9c8ec8f611ef86103502c3
SHA256: 8689727d52a2dd10e2a9dfb9832b5f8b79d92e1ced1a362f71ffc5c36c043366

Audit Items

DescriptionCategories
1.1.1.7 Ensure mounting of FAT filesystems is limited - /etc/fstab

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure mounting of FAT filesystems is limited - lsmod

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure mounting of FAT filesystems is limited - modprobe

CONFIGURATION MANAGEMENT

1.1.6 Ensure separate partition exists for /var

CONFIGURATION MANAGEMENT

1.1.7 Ensure separate partition exists for /var/tmp

CONFIGURATION MANAGEMENT

1.1.11 Ensure separate partition exists for /var/log

AUDIT AND ACCOUNTABILITY

1.1.12 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY

1.1.13 Ensure separate partition exists for /home

CONFIGURATION MANAGEMENT

1.7.1.4 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded

ACCESS CONTROL

3.1.1 Disable IPv6

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.1 Ensure DCCP is disabled - lsmod

SYSTEM AND INFORMATION INTEGRITY

3.4.1 Ensure DCCP is disabled - modprobe

SYSTEM AND INFORMATION INTEGRITY

3.4.2 Ensure SCTP is disabled - lsmod

SYSTEM AND INFORMATION INTEGRITY

3.4.2 Ensure SCTP is disabled - modprobe

SYSTEM AND INFORMATION INTEGRITY

3.4.3 Ensure RDS is disabled - lsmod

SYSTEM AND INFORMATION INTEGRITY

3.4.3 Ensure RDS is disabled - modprobe

SYSTEM AND INFORMATION INTEGRITY

3.4.4 Ensure TIPC is disabled - lsmod

SYSTEM AND INFORMATION INTEGRITY

3.4.4 Ensure TIPC is disabled - modprobe

SYSTEM AND INFORMATION INTEGRITY

4.1.1.1 Ensure auditd is installed - audispd-plugins

AUDIT AND ACCOUNTABILITY

4.1.1.1 Ensure auditd is installed - auditd

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure auditd service is enabled

AUDIT AND ACCOUNTABILITY

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled

AUDIT AND ACCOUNTABILITY

4.1.1.4 Ensure audit_backlog_limit is sufficient

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure audit log storage size is configured

AUDIT AND ACCOUNTABILITY

4.1.2.2 Ensure audit logs are not automatically deleted

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure system is disabled when audit logs are full - action_mail_acct

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure system is disabled when audit logs are full - admin_space_left_action

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - /etc/localtime

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - adjtimex settimeofday stime

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - auditctl /etc/localtime

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - auditctl adjtimex

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - auditctl clock_settime

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - auditctl clock_settime x64

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - auditctl settimeofday,adjtimex x64

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - clock_settime

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - clock_settime x64

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - settimeofday,adjtimex x64

CONFIGURATION MANAGEMENT

4.1.4 Ensure events that modify user/group information are collected - /etc/group

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/gshadow

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/passwd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/security/opasswd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/shadow

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/group

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/gshadow

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/passwd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadow

AUDIT AND ACCOUNTABILITY