| 1.1.1.6 Ensure overlay kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.7 Ensure squashfs kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.1.8 Ensure udf kernel module is not available | CONFIGURATION MANAGEMENT |
| 1.1.2.3.1 Ensure separate partition exists for /home | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.4.1 Ensure separate partition exists for /var | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.5.1 Ensure separate partition exists for /var/tmp | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION |
| 1.1.2.6.1 Ensure separate partition exists for /var/log | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 1.1.2.7.1 Ensure separate partition exists for /var/log/audit | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 1.2.1.2 Ensure weak dependencies are configured | CONFIGURATION MANAGEMENT |
| 1.3.1.3 Ensure all AppArmor Profiles are enforcing | ACCESS CONTROL, MEDIA PROTECTION |
| 1.5.2 Ensure fs.protected_symlinks is configured | ACCESS CONTROL |
| 1.7.1 Ensure GDM is removed | CONFIGURATION MANAGEMENT |
| 1.7.11 Ensure Xwayland is configured | CONFIGURATION MANAGEMENT |
| 2.1.21 Ensure X window server services are not in use | CONFIGURATION MANAGEMENT |
| 3.3.1.1 Ensure net.ipv4.ip_forward is configured | CONFIGURATION MANAGEMENT |
| 4.1.4 Ensure ufw outgoing default is configured | CONFIGURATION MANAGEMENT |
| 5.1.8 Ensure sshd DisableForwarding is enabled | CONFIGURATION MANAGEMENT |
| 5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
| 5.2.4 Ensure users must provide password for escalation | ACCESS CONTROL |
| 5.3.3.1.3 Ensure password failed attempts lockout includes root account | ACCESS CONTROL |
| 5.4.1.2 Ensure minimum password days is configured | IDENTIFICATION AND AUTHENTICATION |
| 5.4.3.1 Ensure nologin is not listed in /etc/shells | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
| 6.1.2.9 Ensure rsyslog-gnutls is installed | AUDIT AND ACCOUNTABILITY |
| 6.1.2.10 Ensure rsyslog forwarding uses gtls | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.1.2.11 Ensure rsyslog CA certificates are configured | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.2.1.1 Ensure auditd packages are installed | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.2.1.2 Ensure auditd service is enabled and active | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.2.1.3 Ensure auditing for processes that start prior to auditd is enabled | AUDIT AND ACCOUNTABILITY |
| 6.2.1.4 Ensure audit_backlog_limit is configured | AUDIT AND ACCOUNTABILITY |
| 6.2.2.1 Ensure audit log storage size is configured | AUDIT AND ACCOUNTABILITY |
| 6.2.2.2 Ensure audit logs are not automatically deleted | AUDIT AND ACCOUNTABILITY |
| 6.2.2.3 Ensure system is disabled when audit logs are full | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.2.2.4 Ensure system warns when audit logs are low on space | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.2.3.1 Ensure modification of the /etc/sudoers file is collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.2 Ensure actions as another user are always logged | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.2.3.3 Ensure events that modify the sudo log file are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.4 Ensure events that modify date and time information are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.5 Ensure events that modify sethostname and setdomainname are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.6 Ensure events that modify /etc/issue and /etc/issue.net are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.7 Ensure events that modify /etc/hosts and /etc/hostname are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.8 Ensure events that modify the system's network environment are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.9 Ensure events that modify /etc/NetworkManager directory are collected | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 6.2.3.10 Ensure use of privileged commands are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.11 Ensure unsuccessful file access attempts are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.12 Ensure events that modify /etc/group information are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.13 Ensure events that modify /etc/passwd information are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.14 Ensure events that modify /etc/shadow and /etc/gshadow are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.15 Ensure events that modify /etc/security/opasswd are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.16 Ensure events that modify /etc/nsswitch.conf file are collected | AUDIT AND ACCOUNTABILITY |
| 6.2.3.17 Ensure events that modify /etc/pam.conf and /etc/pam.d/ information are collected | AUDIT AND ACCOUNTABILITY |