CIS Oracle Linux 8 Workstation L1 v1.0.1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Oracle Linux 8 Workstation L1 v1.0.1

Updated: 9/30/2022

Authority: Operating Systems and Applications

Plugin: Unix

Revision: 1.6

Estimated Item Count: 302

File Details

Filename: CIS_Oracle_Linux_8_Workstation_L1_v1.0.1.audit

Size: 590 kB

MD5: b41661ee762105a88224b503714d7278
SHA256: 8d7ffd34c88e22f3651b5b9eb78b8c75564bd2c1987d28c4e53d43b702f22b03

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe
1.1.1.3 Ensure mounting of squashfs filesystems is disabled - lsmod
1.1.1.3 Ensure mounting of squashfs filesystems is disabled - modprobe
1.1.1.4 Ensure mounting of udf filesystems is disabled - lsmod
1.1.1.4 Ensure mounting of udf filesystems is disabled - modprobe
1.1.2 Ensure /tmp is configured - config check
1.1.2 Ensure /tmp is configured - mount check
1.1.3 Ensure nodev option set on /tmp partition
1.1.4 Ensure nosuid option set on /tmp partition
1.1.5 Ensure noexec option set on /tmp partition
1.1.8 Ensure nodev option set on /var/tmp partition
1.1.9 Ensure nosuid option set on /var/tmp partition
1.1.10 Ensure noexec option set on /var/tmp partition
1.1.14 Ensure nodev option set on /home partition
1.1.15 Ensure nodev option set on /dev/shm partition
1.1.16 Ensure nosuid option set on /dev/shm partition
1.1.17 Ensure noexec option set on /dev/shm partition
1.1.18 Ensure nodev option set on removable media partitions
1.1.19 Ensure nosuid option set on removable media partitions
1.1.20 Ensure noexec option set on removable media partitions
1.1.21 Ensure sticky bit is set on all world-writable directories
1.2.1 Ensure GPG keys are configured
1.2.2 Ensure gpgcheck is globally activated
1.2.3 Ensure package manager repositories are configured
1.3.1 Ensure sudo is installed
1.3.2 Ensure sudo commands use pty
1.3.3 Ensure sudo log file exists
1.4.1 Ensure AIDE is installed
1.4.2 Ensure filesystem integrity is regularly checked - cron
1.4.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.service
1.4.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.timer
1.4.2 Ensure filesystem integrity is regularly checked - systemctl status aidecheck.timer
1.5.1 Ensure permissions on bootloader config are configured
1.5.2 Ensure bootloader password is set
1.5.3 Ensure authentication required for single user mode - emergency.service
1.5.3 Ensure authentication required for single user mode - rescue.service
1.6.1 Ensure core dumps are restricted - limits.conf limits.d
1.6.1 Ensure core dumps are restricted - ProcessSizeMax=0
1.6.1 Ensure core dumps are restricted - Storage=none
1.6.1 Ensure core dumps are restricted - sysctl
1.6.1 Ensure core dumps are restricted - sysctl.conf sysctl.d
1.6.2 Ensure address space layout randomization (ASLR) is enabled - sysctl
1.6.2 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d
1.8.1.1 Ensure message of the day is configured properly - banner text
1.8.1.1 Ensure message of the day is configured properly - mrsv
1.8.1.2 Ensure local login warning banner is configured properly - banner text
1.8.1.2 Ensure local login warning banner is configured properly - mrsv
1.8.1.3 Ensure remote login warning banner is configured properly - banner text
1.8.1.3 Ensure remote login warning banner is configured properly - mrsv