CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0

Audit Details

Name: CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 28

File Details

Filename: CIS_MySQL_8.0_Enterprise_Benchmark_v1.3.0_Level_1_OS_Linux.audit

Size: 69.2 kB

MD5: 25dd2a11e246429a15fa4165f539fd22
SHA256: 95bd754f39effd0698913c7b5c55dcebabe7f59e26052e596dc7b8a350ef9067

Audit Items

DescriptionCategories
1.1 Place Databases on Non-System Partitions

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service

ACCESS CONTROL

1.4 Verify That the MYSQL_PWD Environment Variable is Not in Use

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6 Verify That 'MYSQL_PWD' is Not Set in Users' Profiles

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Backup Policy in Place

CONTINGENCY PLANNING

2.1.2 Verify Backups are Good

CONTINGENCY PLANNING

2.1.3 Secure Backup Credentials

ACCESS CONTROL, CONTINGENCY PLANNING, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 The Backups Should be Properly Secured

CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Disaster Recovery (DR) Plan

CONTINGENCY PLANNING

2.1.7 Backup of Configuration and Related Files

CONTINGENCY PLANNING

2.3 Dedicate the Machine Running MySQL

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Do Not Specify Passwords in the Command Line

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure Non-Default, Unique Cryptographic Material is in Use

CONFIGURATION MANAGEMENT

3.1 Ensure 'datadir' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure 'log_bin_basename' Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure 'log_error' Has Appropriate Permissions

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.5 Ensure 'relay_log_basename' Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure 'general_log_file' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure SSL Key Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure Plugin Directory Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure 'audit_log_file' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.10 Secure MySQL Keyring

ACCESS CONTROL, MEDIA PROTECTION

4.4 Harden Usage for 'local_infile' on MySQL Clients - mysql client version

CONFIGURATION MANAGEMENT

4.5 Ensure 'mysqld' is Not Started With '--skip-grant-tables'

ACCESS CONTROL, MEDIA PROTECTION

6.4 Ensure 'log-raw' is Set to 'OFF'

MEDIA PROTECTION

7.2 Ensure Passwords are Not Stored in the Global Configuration

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_MySQL_8.0_Enterprise_Benchmark_v1.3.0_Level_1_OS_Linux.audit from CIS Oracle MySQL 8.0 Enterprise Edition Benchmark