CIS Debian Linux 11 Server L1 v1.0.0

Audit Details

Name: CIS Debian Linux 11 Server L1 v1.0.0

Updated: 3/20/2023

Authority: CIS

Plugin: Unix

Revision: 1.4

Estimated Item Count: 349

File Details

Filename: CIS_Debian_Linux_11_v1.0.0_L1_Server.audit

Size: 1.25 MB

MD5: 72b98a0bd01cd493a84121fba8b133a2
SHA256: 03039a7e9062338ebe4cabf6651e3ae6595beab6dabaf533c165110c0ed19bc2

Audit Changelog

 
Revision 1.4

Mar 20, 2023

Functional Update
  • 1.1.1.1 Ensure mounting of cramfs filesystems is disabled - blacklist
  • 1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe
  • 1.1.10 Disable USB Storage - modprobe
  • 1.1.7.2 Ensure nodev option set on /home partition
  • 1.3.2 Ensure filesystem integrity is regularly checked
  • 2.1.2.1 Ensure chrony is configured with authorized timeserver - server
  • 3.2.1 Ensure packet redirect sending is disabled - net.ipv4.conf.all.send_redirects (sysctl.conf/sysctl.d)
  • 3.2.1 Ensure packet redirect sending is disabled - net.ipv4.conf.default.send_redirects (sysctl.conf/sysctl.d)
  • 3.2.2 Ensure IP forwarding is disabled - ipv4 (sysctl.conf/sysctl.d)
  • 3.2.2 Ensure IP forwarding is disabled - ipv6 (sysctl.conf/sysctl.d)
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearch
  • 4.1.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace
  • 4.2.2.4 Ensure rsyslog default file permissions are configured
  • 4.2.2.5 Ensure logging is configured - '*.*;mail.none;news.none -/var/log/messages'
  • 4.2.2.5 Ensure logging is configured - '*.=warning;*.=err -/var/log/warn'
  • 4.2.2.5 Ensure logging is configured - '*.crit /var/log/warn'
  • 4.2.2.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.2.5 Ensure logging is configured - 'auth,authpriv.* /var/log/auth.log'
  • 4.2.2.5 Ensure logging is configured - 'local0,local1.* -/var/log/localmessages'
  • 4.2.2.5 Ensure logging is configured - 'local2,local3.* -/var/log/localmessages'
  • 4.2.2.5 Ensure logging is configured - 'local4,local5.* -/var/log/localmessages'
  • 4.2.2.5 Ensure logging is configured - 'local6,local7.* -/var/log/localmessages'
  • 4.2.2.5 Ensure logging is configured - 'mail.* -/var/log/mail'
  • 4.2.2.5 Ensure logging is configured - 'mail.err /var/log/mail.err'
  • 4.2.2.5 Ensure logging is configured - 'mail.info -/var/log/mail.info'
  • 4.2.2.5 Ensure logging is configured - 'mail.warning -/var/log/mail.warn'
  • 4.2.2.5 Ensure logging is configured - 'news.crit -/var/log/news/news.crit'
  • 4.2.2.5 Ensure logging is configured - 'news.err -/var/log/news/news.err'
  • 4.2.2.5 Ensure logging is configured - 'news.notice -/var/log/news/news.notice'
  • 4.2.2.6 Ensure rsyslog is configured to send logs to a remote log host
  • 5.2.10 Ensure SSH PermitUserEnvironment is disabled
  • 5.2.11 Ensure SSH IgnoreRhosts is enabled
  • 5.2.20 Ensure SSH MaxSessions is set to 10 or less
  • 5.2.8 Ensure SSH HostbasedAuthentication is disabled
  • 5.2.9 Ensure SSH PermitEmptyPasswords is disabled
  • 5.4.4 Ensure password hashing algorithm is up to date with the latest standards
Revision 1.3

Mar 7, 2023

Miscellaneous
  • Metadata updated.
  • References updated.
Revision 1.2

Jan 10, 2023

Functional Update
  • 1.7.1 Ensure message of the day is configured properly - platform flags
  • 1.7.4 Ensure permissions on /etc/motd are configured
  • 4.2.2.3 Ensure journald is configured to send logs to rsyslog
Revision 1.1

Jan 5, 2023

Miscellaneous
  • Metadata updated.