CIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS on Linux Unix

Audit Details

Name: CIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS on Linux Unix

Updated: 12/16/2025

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 24

File Details

Filename: CIS_Oracle_MySQL_Community_Server_8.0_v1.2.0_L1_MySQL_RDBMS_on_Linux_Unix.audit

Size: 62.4 kB

MD5: 9b1e114d362e2dd813dcaafd4d9e3af5
SHA256: 35ae38866fefc1879272c9af644fcf16969682bb1b61d7a77c369863973663b8

Audit Items

DescriptionCategories
1.1 Place Databases on Non-System Partitions

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service

ACCESS CONTROL

1.4 Verify That the MYSQL_PWD Environment Variable is Not in Use

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6 Verify That 'MYSQL_PWD' is Not Set in Users' Profiles

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Backup Policy in Place

CONTINGENCY PLANNING

2.1.2 Verify Backups are Good

CONTINGENCY PLANNING

2.1.3 Secure Backup Credentials

ACCESS CONTROL, CONTINGENCY PLANNING, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.5 Disaster Recovery (DR) Plan

CONTINGENCY PLANNING

2.1.6 Backup of Configuration and Related Files

CONTINGENCY PLANNING

2.3 Dedicate the Machine Running MySQL

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Do Not Specify Passwords in the Command Line

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure Non-Default, Unique Cryptographic Material is in Use

CONFIGURATION MANAGEMENT

3.1 Ensure 'datadir' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure 'log_bin_basename' Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure 'log_error' Has Appropriate Permissions

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.5 Ensure 'relay_log_basename' Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure 'general_log_file' Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure SSL Key Files Have Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure Plugin Directory Has Appropriate Permissions

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started With '--skip-grant-tables'

ACCESS CONTROL, MEDIA PROTECTION

6.4 Ensure 'log-raw' is Set to 'OFF'

MEDIA PROTECTION

7.2 Ensure Passwords are Not Stored in the Global Configuration

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Oracle_MySQL_Community_Server_8.0_v1.2.0_L1_MySQL_RDBMS_on_Linux_Unix.audit from CIS Oracle MySQL Community Server 8.0 v1.2.0