CIS Oracle Linux 8 Workstation L2 v2.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Oracle Linux 8 Workstation L2 v2.0.0

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.16

Estimated Item Count: 144

File Details

Filename: CIS_Oracle_Linux_8_Workstation_L2_v2.0.0.audit

Size: 479 kB

MD5: 7c9a6bffcaa8a15c6370e9302e990da5
SHA256: 1cc36895fbb5d2bb521ad9f94ce50f188ab68259f7b62c96d9f8fa52601d809d

Audit Items

DescriptionCategories
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - blacklist
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmod
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobe
1.1.1.3 Ensure mounting of udf filesystems is disabled - lsmod
1.1.1.3 Ensure mounting of udf filesystems is disabled - modprobe
1.1.3.1 Ensure separate partition exists for /var
1.1.4.1 Ensure separate partition exists for /var/tmp
1.1.5.1 Ensure separate partition exists for /var/log
1.1.6.1 Ensure separate partition exists for /var/log/audit
1.1.7.1 Ensure separate partition exists for /home
1.1.9 Disable Automounting
1.1.10 Disable USB Storage - lsmod
1.1.10 Disable USB Storage - modprobe
1.6.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/config
1.6.1.5 Ensure the SELinux mode is enforcing - getenforce
1.8.5 Ensure automatic mounting of removable media is disabled
2.2.3 Ensure Avahi Server is not installed - avahi
2.2.3 Ensure Avahi Server is not installed - avahi-autoipd
3.1.2 Ensure SCTP is disabled - lsmod
3.1.2 Ensure SCTP is disabled - modprobe
3.1.3 Ensure DCCP is disabled - lsmod
3.1.3 Ensure DCCP is disabled - modprobe
4.1.1.1 Ensure auditd is installed
4.1.1.2 Ensure auditd service is enabled
4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled
4.1.1.4 Ensure audit_backlog_limit is sufficient
4.1.2.1 Ensure audit log storage size is configured
4.1.2.2 Ensure audit logs are not automatically deleted
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = email
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = halt
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = root
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.d
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers
4.1.3.1 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d
4.1.3.2 Ensure actions as another user are always logged - /etc/audit/rules.d/*.rules b32
4.1.3.2 Ensure actions as another user are always logged - /etc/audit/rules.d/*.rules b64
4.1.3.2 Ensure actions as another user are always logged - auditctl b32
4.1.3.2 Ensure actions as another user are always logged - auditctl b64
4.1.3.3 Ensure events that modify the sudo log file are collected - /etc/audit/rules.d/*.rules
4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl
4.1.3.4 Ensure events that modify date and time information are collected - '/etc/localtime'
4.1.3.4 Ensure events that modify date and time information are collected - 'adjtimex'
4.1.3.4 Ensure events that modify date and time information are collected - 'auditctl /etc/localtime'
4.1.3.4 Ensure events that modify date and time information are collected - 'clock_settime'
4.1.3.4 Ensure events that modify date and time information are collected - 'settimeofday'
4.1.3.4 Ensure events that modify date and time information are collected - 'stime'
4.1.3.4 Ensure events that modify date and time information are collected - adjtimex x64
4.1.3.4 Ensure events that modify date and time information are collected - auditctl adjtimex
4.1.3.4 Ensure events that modify date and time information are collected - auditctl adjtimex x64