1.1.1.2 Ensure mounting of squashfs filesystems is disabled - blacklist | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of udf filesystems is disabled - blacklist | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.3.1 Ensure separate partition exists for /var | ACCESS CONTROL, MEDIA PROTECTION |
1.1.4.1 Ensure separate partition exists for /var/tmp | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5.1 Ensure separate partition exists for /var/log | AUDIT AND ACCOUNTABILITY |
1.1.6.1 Ensure separate partition exists for /var/log/audit | AUDIT AND ACCOUNTABILITY |
1.1.7.1 Ensure separate partition exists for /home | ACCESS CONTROL, MEDIA PROTECTION |
1.1.9 Disable Automounting | MEDIA PROTECTION |
1.1.10 Disable USB Storage - blacklist | MEDIA PROTECTION |
1.1.10 Disable USB Storage - lsmod | MEDIA PROTECTION |
1.1.10 Disable USB Storage - modprobe | MEDIA PROTECTION |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - complain | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - loaded | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | ACCESS CONTROL, MEDIA PROTECTION |
1.8.6 Ensure GDM automatic mounting of removable media is disabled | MEDIA PROTECTION |
1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
2.2.3 Ensure CUPS is not installed | CONFIGURATION MANAGEMENT |
3.1.2 Ensure wireless interfaces are disabled | CONFIGURATION MANAGEMENT |
3.1.3 Ensure DCCP is disabled - blacklist | CONFIGURATION MANAGEMENT |
3.1.3 Ensure DCCP is disabled - lsmod | CONFIGURATION MANAGEMENT |
3.1.3 Ensure DCCP is disabled - modprobe | CONFIGURATION MANAGEMENT |
3.1.4 Ensure SCTP is disabled - blacklist | CONFIGURATION MANAGEMENT |
3.1.4 Ensure SCTP is disabled - lsmod | CONFIGURATION MANAGEMENT |
3.1.4 Ensure SCTP is disabled - modprobe | CONFIGURATION MANAGEMENT |
3.1.5 Ensure RDS is disabled - blacklist | SYSTEM AND INFORMATION INTEGRITY |
3.1.5 Ensure RDS is disabled - lsmod | SYSTEM AND INFORMATION INTEGRITY |
3.1.5 Ensure RDS is disabled - modprobe | SYSTEM AND INFORMATION INTEGRITY |
3.1.6 Ensure TIPC is disabled - blacklist | SYSTEM AND INFORMATION INTEGRITY |
3.1.6 Ensure TIPC is disabled - lsmod | SYSTEM AND INFORMATION INTEGRITY |
3.1.6 Ensure TIPC is disabled - modprobe | SYSTEM AND INFORMATION INTEGRITY |
4.1.1.1 Ensure auditd is installed | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure auditd service is enabled and active - active | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure auditd service is enabled and active - enabled | AUDIT AND ACCOUNTABILITY |
4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled | AUDIT AND ACCOUNTABILITY |
4.1.1.4 Ensure audit_backlog_limit is sufficient | AUDIT AND ACCOUNTABILITY |
4.1.2.1 Ensure audit log storage size is configured | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full - 'action_mail_acct = root' | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full - 'admin_space_left_action' | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full - 'space_left_action = email' | AUDIT AND ACCOUNTABILITY |
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers | AUDIT AND ACCOUNTABILITY |
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers.d | AUDIT AND ACCOUNTABILITY |
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - sudoers | AUDIT AND ACCOUNTABILITY |
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - sudoers.d | AUDIT AND ACCOUNTABILITY |
4.1.3.2 Ensure actions as another user are always logged - auditctl b32 | AUDIT AND ACCOUNTABILITY |
4.1.3.2 Ensure actions as another user are always logged - auditctl b64 | AUDIT AND ACCOUNTABILITY |