CIS Oracle Linux 7 Server L1 v3.1.1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Oracle Linux 7 Server L1 v3.1.1

Updated: 4/12/2024

Authority: CIS

Plugin: Unix

Revision: 1.28

Estimated Item Count: 328

File Details

Filename: CIS_Oracle_Linux_7_v3.1.1_Server_L1.audit

Size: 770 kB

MD5: 6e53ff2745c79188fb07b38702d1cfd3
SHA256: ca3e20dc4334fbddfd9a239feb164d394b1c45facdbc9917ed866a20d3df5ede

Audit Changelog

 
Revision 1.28

Apr 12, 2024

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.27

Mar 18, 2024

Functional Update
  • 3.1.2 Ensure wireless interfaces are disabled
Revision 1.26

Feb 12, 2024

Functional Update
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • Metadata updated.
Revision 1.25

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.24

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.23

Oct 3, 2023

Functional Update
  • 1.8.3 Ensure last logged in user display is disabled - disable user list
Informational Update
  • 5.5.5 Ensure default user umask is configured - system wide default
  • 5.5.5 Ensure default user umask is configured - system wide umask
Revision 1.22

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 5.3.2 Ensure permissions on SSH private host key files are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.21

Aug 8, 2023

Functional Update
  • 2.2.13 Ensure net-snmp is not installed
Revision 1.20

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - running
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts.. - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts.. - imtcp.so
Revision 1.19

Jul 20, 2023

Functional Update
  • 5.5.1.1 Ensure password expiration is 365 days or less - users
  • 5.5.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.5.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.10 Ensure root PATH Integrity
  • 6.2.11 Ensure all users' home directories exist
  • 6.2.12 Ensure users own their home directories
  • 6.2.13 Ensure users' home directories permissions are 750 or more restrictive