CIS Fedora 19 Family Linux Workstation L1 v1.0.0

Audit Details

Name: CIS Fedora 19 Family Linux Workstation L1 v1.0.0

Updated: 12/15/2023

Authority: CIS

Plugin: Unix

Revision: 1.23

Estimated Item Count: 300

File Details

Filename: CIS_Fedora_19_Family_Linux_Workstation_L1_v1.0.0.audit

Size: 798 kB

MD5: 88bf54219c9c95f6ab44fac298cfdab8
SHA256: 94fef7bbba4cea6180d3f831ed609347c500963429a5859cf4639569e0220509

Audit Changelog

 
Revision 1.23

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.22

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.21

Oct 6, 2023

Functional Update
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain FORWARD
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain INPUT
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain OUTPUT
  • 3.5.3.3.2 Ensure IPv6 loopback traffic is configured - INPUT
  • 3.5.3.3.2 Ensure IPv6 loopback traffic is configured - OUTPUT
  • 3.5.3.3.3 Ensure IPv6 outbound and established connections are configured
  • 3.5.3.3.4 Ensure IPv6 firewall rules exist for all open ports
  • 3.5.3.3.5 Ensure ip6tables rules are saved - FORWARD
  • 3.5.3.3.5 Ensure ip6tables rules are saved - INPUT
  • 3.5.3.3.5 Ensure ip6tables rules are saved - OUTPUT
  • 3.5.3.3.6 Ensure ip6tables is enabled and running - is-enabled
  • 3.5.3.3.6 Ensure ip6tables is enabled and running - status
Revision 1.20

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.19

Aug 8, 2023

Functional Update
  • 2.2.15 Ensure net-snmp is not installed
Revision 1.18

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - is-enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - status
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - ModLoad imtcp
Revision 1.17

Jul 20, 2023

Functional Update
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
  • 5.4.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.4 Ensure root PATH Integrity
  • 6.2.5 Ensure all users' home directories exist
  • 6.2.6 Ensure users' home directories permissions are 750 or more restrictive
  • 6.2.7 Ensure users own their home directories
Revision 1.16

Jun 2, 2023

Functional Update
  • 2.2.1.3 Ensure ntp is configured - restrict -4
Revision 1.15

May 19, 2023

Functional Update
  • 5.3.1 Ensure password creation requirements are configured - enforce-for-root
Revision 1.14

May 16, 2023

Functional Update
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
  • 5.4.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - useradd
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - users
Miscellaneous
  • Variables updated.