Nov 3, 2025 Functional Update- 2.1.10 Ensure nis server services are not in use
- 2.1.13 Ensure rpcbind services are not in use
- 2.1.18 Ensure web proxy server services are not in use
- 2.1.20 Ensure xinetd services are not in use
- 2.1.5 Ensure dnsmasq services are not in use
- 2.1.6 Ensure ftp server services are not in use
- 6.1.1.2 Ensure journald log file access is configured
Informational Update- 1.1.1.1 Ensure cramfs kernel module is not available
- 1.1.1.10 Ensure unused filesystems kernel modules are not available
- 1.1.1.2 Ensure freevxfs kernel module is not available
- 1.1.1.3 Ensure hfs kernel module is not available
- 1.1.1.4 Ensure hfsplus kernel module is not available
- 1.1.1.5 Ensure jffs2 kernel module is not available
- 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition
- 1.1.2.1.2 Ensure nodev option set on /tmp partition
- 1.1.2.1.3 Ensure nosuid option set on /tmp partition
- 1.1.2.1.4 Ensure noexec option set on /tmp partition
- 1.1.2.2.1 Ensure /dev/shm is tmpfs or a separate partition
- 1.1.2.2.2 Ensure nodev option set on /dev/shm partition
- 1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
- 1.1.2.2.4 Ensure noexec option set on /dev/shm partition
- 1.1.2.3.2 Ensure nodev option set on /home partition
- 1.1.2.3.3 Ensure nosuid option set on /home partition
- 1.1.2.4.2 Ensure nodev option set on /var partition
- 1.1.2.4.3 Ensure nosuid option set on /var partition
- 1.1.2.5.2 Ensure nodev option set on /var/tmp partition
- 1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
- 1.1.2.5.4 Ensure noexec option set on /var/tmp partition
- 1.1.2.6.2 Ensure nodev option set on /var/log partition
- 1.1.2.6.3 Ensure nosuid option set on /var/log partition
- 1.1.2.6.4 Ensure noexec option set on /var/log partition
- 1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
- 1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
- 1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
- 1.5.1 Ensure randomize_va_space is configured
- 1.5.2 Ensure ptrace_scope is configured
- 1.5.3 Ensure suid_dumpable is configured
- 1.5.4 Ensure core file size is configured
- 1.6.1 Ensure /etc/motd is configured
- 1.6.2 Ensure /etc/issue is configured
- 1.6.3 Ensure /etc/issue.net is configured
- 2.1.11 Ensure openssh server services are not in use
- 2.1.13 Ensure rpcbind services are not in use
- 2.1.14 Ensure rsync services are not in use
- 2.1.16 Ensure snmp services are not in use
- 2.1.17 Ensure tftp server services are not in use
- 2.1.19 Ensure web server services are not in use
- 2.1.20 Ensure xinetd services are not in use
- 2.1.3 Ensure dhcp server services are not in use
- 2.1.4 Ensure dns server services are not in use
- 2.1.8 Ensure message access server services are not in use
- 2.2.2 Ensure rsh client is not installed
- 2.3.1.1 Ensure a single time synchronization daemon is in use
- 2.3.2.1 Ensure systemd-timesyncd configured with authorized timeserver
- 2.4.1.8 Ensure access to /etc/cron.d is configured
- 2.4.1.9 Ensure access to crontab is configured
- 2.4.2.1 Ensure access to at is configured
- 3.2.1 Ensure dccp kernel module is not available
- 3.2.2 Ensure tipc kernel module is not available
- 3.2.3 Ensure rds kernel module is not available
- 3.2.4 Ensure sctp kernel module is not available
- 3.3.1 Ensure ip forwarding is disabled
- 3.3.10 Ensure tcp syn cookies is enabled
- 3.3.11 Ensure ipv6 router advertisements are not accepted
- 3.3.2 Ensure packet redirect sending is disabled
- 3.3.3 Ensure bogus icmp responses are ignored
- 3.3.4 Ensure broadcast icmp requests are ignored
- 3.3.5 Ensure icmp redirects are not accepted
- 3.3.6 Ensure secure icmp redirects are not accepted
- 3.3.7 Ensure reverse path filtering is enabled
- 3.3.8 Ensure source routed packets are not accepted
- 3.3.9 Ensure suspicious packets are logged
- 5.1.1 Ensure sudo is installed
- 5.1.2 Ensure sudo commands use pty
- 5.1.3 Ensure sudo log file exists
- 5.1.7 Ensure access to the su command is restricted
- 5.2.2.1 Ensure pam_unix module is enabled
- 5.2.2.2 Ensure pam_faillock module is enabled
- 5.2.2.4 Ensure pam_pwhistory module is enabled
- 5.2.3.1.1 Ensure password failed attempts lockout is configured
- 5.2.3.2.1 Ensure password number of changed characters is configured
- 5.2.3.2.2 Ensure minimum password length is configured
- 5.2.3.2.4 Ensure password same consecutive characters is configured
- 5.2.3.2.5 Ensure password maximum sequential characters is configured
- 5.2.3.2.6 Ensure password dictionary check is enabled
- 5.2.3.2.7 Ensure password quality checking is enforced
- 5.2.3.4.2 Ensure pam_unix does not include remember
- 5.3.1.4 Ensure strong password hashing algorithm is configured
- 5.3.2.5 Ensure root path integrity
- 5.3.2.6 Ensure root user umask is configured
- 5.3.3.2 Ensure default user shell timeout is configured
- 5.3.3.3 Ensure default user umask is configured
- 6.1.1.3 Ensure journald log file rotation is configured
- 6.1.2.2 Ensure journald ForwardToSyslog is disabled
- 6.1.2.3 Ensure journald Compress is configured
- 6.1.2.4 Ensure journald Storage is configured
- 6.1.3.1 Ensure access to all logfiles has been configured
- 7.2.1 Ensure accounts in /etc/passwd use shadowed passwords
- 7.2.10 Ensure local interactive user dot files access is configured
- 7.2.3 Ensure all groups in /etc/passwd exist in /etc/group
- 7.2.7 Ensure no duplicate user names exist
- 7.2.8 Ensure no duplicate group names exist
|