| 1.1.1.1 Ensure cramfs kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.2 Ensure freevxfs kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.3 Ensure hfs kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.4 Ensure hfsplus kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.5 Ensure jffs2 kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.9 Ensure firewire-core kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.10 Ensure usb-storage kernel module is not available | IDENTIFICATION AND AUTHENTICATION |
| 1.1.1.11 Ensure unused filesystems kernel modules are not available | CONFIGURATION MANAGEMENT |
| 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition | CONFIGURATION MANAGEMENT |
| 1.1.2.1.2 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
| 1.1.2.1.3 Ensure nosuid option set on /tmp partition | CONFIGURATION MANAGEMENT |
| 1.1.2.1.4 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT |
| 1.1.2.2.1 Ensure /dev/shm is tmpfs or a separate partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.2.2 Ensure nodev option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
| 1.1.2.2.3 Ensure nosuid option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
| 1.1.2.2.4 Ensure noexec option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
| 1.1.2.3.2 Ensure nodev option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
| 1.1.2.3.3 Ensure nosuid option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
| 1.1.2.4.2 Ensure nodev option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
| 1.1.2.4.3 Ensure nosuid option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
| 1.1.2.5.2 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.5.3 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.5.4 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.6.2 Ensure nodev option set on /var/log partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.6.3 Ensure nosuid option set on /var/log partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.6.4 Ensure noexec option set on /var/log partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.7.2 Ensure nodev option set on /var/log/audit partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.7.4 Ensure noexec option set on /var/log/audit partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.2.1.1 Ensure the source.list and .source files use the Signed-By option | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
| 1.2.1.3 Ensure access to gpg key files are configured | ACCESS CONTROL |
| 1.2.1.4 Ensure access to /etc/apt/trusted.gpg.d directory is configured | ACCESS CONTROL |
| 1.2.1.5 Ensure access to /etc/apt/auth.conf.d directory is configured | ACCESS CONTROL |
| 1.2.1.6 Ensure access to files in the /etc/apt/auth.conf.d/ directory is configured | ACCESS CONTROL, MEDIA PROTECTION |
| 1.2.1.7 Ensure access to /usr/share/keyrings directory is configured | ACCESS CONTROL |
| 1.2.1.8 Ensure access to /etc/apt/sources.list.d directory is configured | ACCESS CONTROL |
| 1.2.1.9 Ensure access to files in /etc/apt/sources.list.d are configured | ACCESS CONTROL |
| 1.2.2.1 Ensure updates, patches, and additional security software are installed | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
| 1.3.1.1 Ensure apparmor packages are installed | ACCESS CONTROL, MEDIA PROTECTION |
| 1.3.1.2 Ensure AppArmor is enabled | ACCESS CONTROL, MEDIA PROTECTION |
| 1.3.1.4 Ensure apparmor_restrict_unprivileged_unconfined is enabled | SYSTEM AND INFORMATION INTEGRITY |
| 1.4.1 Ensure bootloader password is set | ACCESS CONTROL, MEDIA PROTECTION |
| 1.4.2 Ensure access to bootloader config is configured | ACCESS CONTROL, MEDIA PROTECTION |
| 1.5.1 Ensure fs.protected_hardlinks is configured | ACCESS CONTROL |
| 1.5.3 Ensure kernel.yama.ptrace_scope is configured | CONFIGURATION MANAGEMENT |
| 1.5.4 Ensure fs.suid_dumpable is configured | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| 1.5.5 Ensure kernel.dmesg_restrict is configured | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.5.6 Ensure prelink is not installed | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 1.5.7 Ensure Automatic Error Reporting is configured | CONFIGURATION MANAGEMENT |
| 1.5.8 Ensure kernel.kptr_restrict is configured | CONFIGURATION MANAGEMENT |