| Jun 17, 2024 | 
| May 15, 2024 MiscellaneousAudit deprecated.Metadata updated.References updated.
 | 
| Apr 22, 2024 Functional Update4.2.2.6 Ensure rsyslog is configured to send logs to a remote log host
 | 
| Apr 1, 2024 | 
| Mar 18, 2024 Functional Update3.1.1 Ensure system is checked to determine if IPv6 is enabled5.2.2 Ensure permissions on SSH private host key files are configured
Added4.2.3 Ensure all logfiles have appropriate permissions and ownership5.2.12 Ensure SSH X11 forwarding is disabled
Removed4.2.3 Ensure all logfiles have appropriate access configured
 | 
| Feb 8, 2024 Functional Update2.4 Ensure nonessential services are removed or masked3.1.1 Ensure system is checked to determine if IPv6 is enabled3.5.2.10 Ensure nftables rules are permanent - hook forward3.5.2.10 Ensure nftables rules are permanent - hook input3.5.2.10 Ensure nftables rules are permanent - hook output3.5.2.3 Ensure iptables are flushed with nftables3.5.2.7 Ensure nftables outbound and established connections are configured3.5.3.2.2 Ensure iptables loopback traffic is configured3.5.3.2.3 Ensure iptables outbound and established connections are configured3.5.3.2.4 Ensure iptables firewall rules exist for all open ports3.5.3.3.2 Ensure ip6tables loopback traffic is configured3.5.3.3.3 Ensure ip6tables outbound and established connections are configured3.5.3.3.4 Ensure ip6tables firewall rules exist for all open ports4.2.1.6 Ensure journald log rotation is configured per site policy
 | 
| Feb 5, 2024 | 
| Feb 1, 2024 Functional Update1.1.3.2 Ensure nodev option set on /var partition1.1.3.3 Ensure nosuid option set on /var partition1.1.4.2 Ensure noexec option set on /var/tmp partition1.1.4.3 Ensure nosuid option set on /var/tmp partition1.1.4.4 Ensure nodev option set on /var/tmp partition1.1.5.2 Ensure nodev option set on /var/log partition1.1.5.3 Ensure noexec option set on /var/log partition1.1.5.4 Ensure nosuid option set on /var/log partition1.1.6.2 Ensure noexec option set on /var/log/audit partition1.1.6.3 Ensure nodev option set on /var/log/audit partition1.1.6.4 Ensure nosuid option set on /var/log/audit partition1.1.7.2 Ensure nodev option set on /home partition1.1.7.3 Ensure nosuid option set on /home partition1.1.8.1 Ensure nodev option set on /dev/shm partition1.1.8.2 Ensure noexec option set on /dev/shm partition1.1.8.3 Ensure nosuid option set on /dev/shm partition1.5.1 Ensure address space layout randomization (ASLR) is enabled - config1.5.3 Ensure Automatic Error Reporting is not enabled1.5.4 Ensure core dumps are restricted - limits config1.5.4 Ensure core dumps are restricted - sysctl config1.8.4 Ensure GDM screen locks when the user is idle - idle-delay1.8.4 Ensure GDM screen locks when the user is idle - lock-delay1.8.5 Ensure GDM screen locks cannot be overridden - idle-delay1.8.5 Ensure GDM screen locks cannot be overridden - lock-delay1.9 Ensure updates, patches, and additional security software are installed2.1.2.2 Ensure chrony is running as user _chrony2.2.15 Ensure mail transfer agent is configured for local-only mode3.1.1 Ensure system is checked to determine if IPv6 is enabled3.3.1 Ensure source routed packets are not accepted - net.ipv4.conf.all.accept_source_route (sysctl.conf/sysctl.d)3.3.1 Ensure source routed packets are not accepted - net.ipv4.conf.default.accept_source_route (sysctl.conf/sysctl.d)3.3.1 Ensure source routed packets are not accepted - net.ipv6.conf.all.accept_source_route (sysctl.conf/sysctl.d)3.3.1 Ensure source routed packets are not accepted - net.ipv6.conf.default.accept_source_route (sysctl.conf/sysctl.d)3.3.2 Ensure ICMP redirects are not accepted - net.ipv4.conf.all.accept_redirects (sysctl.conf/sysctl.d)3.3.2 Ensure ICMP redirects are not accepted - net.ipv4.conf.default.accept_redirects (sysctl.conf/sysctl.d)3.3.2 Ensure ICMP redirects are not accepted - net.ipv6.conf.all.accept_redirects (sysctl.conf/sysctl.d)3.3.2 Ensure ICMP redirects are not accepted - net.ipv6.conf.default.accept_redirects (sysctl.conf/sysctl.d)3.3.3 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects' (sysctl.conf/sysctl.d)3.3.3 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects' (sysctl.conf/sysctl.d)3.3.4 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians' (sysctl.conf/sysctl.d)3.3.4 Ensure suspicious packets are logged - 'net.ipv4.conf.default.log_martians' (sysctl.conf/sysctl.d)3.3.5 Ensure broadcast ICMP requests are ignored - sysctl.conf/sysctl.d3.3.6 Ensure bogus ICMP responses are ignored - (sysctl.conf/sysctl.d)3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter' (sysctl.conf/sysctl.d)3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter' (sysctl.conf/sysctl.d)3.3.8 Ensure TCP SYN Cookies is enabled - sysctl.conf/sysctl.d3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra' (sysctl.conf/sysctl.d)3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra' (sysctl.conf/sysctl.d)3.5.2.10 Ensure nftables rules are permanent - hook forward3.5.2.10 Ensure nftables rules are permanent - hook input3.5.2.10 Ensure nftables rules are permanent - hook output3.5.2.6 Ensure nftables loopback traffic is configured - lo3.5.2.6 Ensure nftables loopback traffic is configured - v43.5.2.6 Ensure nftables loopback traffic is configured - v64.2.1.1.4 Ensure journald is not configured to receive logs from a remote client4.2.2.1 Ensure rsyslog is installed4.2.2.2 Ensure rsyslog service is enabled4.2.2.3 Ensure journald is configured to send logs to rsyslog4.2.2.4 Ensure rsyslog default file permissions are configured4.2.2.5 Ensure logging is configured4.2.2.6 Ensure rsyslog is configured to send logs to a remote log host4.2.2.7 Ensure rsyslog is not configured to receive logs from a remote client5.2.10 Ensure SSH PermitUserEnvironment is disabled5.2.11 Ensure SSH IgnoreRhosts is enabled5.2.13 Ensure only strong Ciphers are used5.2.14 Ensure only strong MAC algorithms are used5.2.15 Ensure only strong Key Exchange algorithms are used5.2.17 Ensure SSH warning banner is configured5.2.18 Ensure SSH MaxAuthTries is set to 4 or less5.2.19 Ensure SSH MaxStartups is configured5.2.20 Ensure SSH MaxSessions is set to 10 or less5.2.21 Ensure SSH LoginGraceTime is set to one minute or less5.2.22 Ensure SSH Idle Timeout Interval is configured5.2.4 Ensure SSH access is limited5.2.5 Ensure SSH LogLevel is appropriate5.2.6 Ensure SSH PAM is enabled5.2.7 Ensure SSH root login is disabled5.2.8 Ensure SSH HostbasedAuthentication is disabled5.2.9 Ensure SSH PermitEmptyPasswords is disabled5.3.2 Ensure sudo commands use pty5.3.3 Ensure sudo log file exists5.3.5 Ensure re-authentication for privilege escalation is not disabled globally5.3.6 Ensure sudo authentication timeout is configured correctly5.3.7 Ensure access to the su command is restricted5.4.4 Ensure password hashing algorithm is up to date with the latest standards5.5.1.1 Ensure minimum days between password changes is configured - users5.5.1.5 Ensure all users last password change date is in the past5.5.2 Ensure system accounts are secured5.5.4 Ensure default user umask is 027 or more restrictive - Default user umask5.5.4 Ensure default user umask is 027 or more restrictive - Restrictive system umask6.2.1 Ensure accounts in /etc/passwd use shadowed passwords6.2.2 Ensure /etc/shadow password fields are not empty6.2.4 Ensure shadow group is empty6.2.9 Ensure root PATH Integrity
Informational Update2.1.2.2 Ensure chrony is running as user _chrony2.1.4.3 Ensure ntp is running as user ntp
Added2.1.4.3 Ensure ntp is running as user ntp - RUNASUSER2.1.4.3 Ensure ntp is running as user ntp - user5.4.1 Ensure password creation requirements are configured
Removed2.1.4.3 Ensure ntp is running as user ntp  - RUNASUSER2.1.4.3 Ensure ntp is running as user ntp  - user5.4.1 Ensure password creation requirements are configured - 'dcredit'5.4.1 Ensure password creation requirements are configured - 'lcredit'5.4.1 Ensure password creation requirements are configured - 'minlen'5.4.1 Ensure password creation requirements are configured - 'ocredit'5.4.1 Ensure password creation requirements are configured - 'ucredit'5.4.1 Ensure password creation requirements are configured - retry
 | 
| Jan 22, 2024 Functional Update5.2.22 Ensure SSH Idle Timeout Interval is configured
 | 
| Jan 3, 2024 Functional Update2.2.13 Ensure SNMP Server is not installed
 |