CIS Oracle Solaris 11.4 L1 v1.1.0

Audit Details

Name: CIS Oracle Solaris 11.4 L1 v1.1.0

Updated: 4/1/2024

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 89

File Details

Filename: CIS_Oracle_Solaris_11.4_L1_v1.1.0.audit

Size: 242 kB

MD5: fa2c2a037cc873bc1d9d2380057e486d
SHA256: d7ef0a2edd74f97a372f58c6f2c83ad197de83b78fc01462d9d83215ad9fe22c

Audit Items

DescriptionCategories
1.1 Use the Latest Package Updates

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.1 Configure TCP Wrappers

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Disable Local-only Graphical Login Environment

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Configure sendmail Service for Local-Only Mode

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Disable RPC Encryption Key

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Disable Generic Security Services (GSS)

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Disable Apache Service

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.7 Disable Kerberos TGT Expiration Warning

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.8 Disable NIS Client Services

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Disable NIS Server Services

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.10 Disable Removable Volume Manager

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Disable automount Service

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Disable Telnet Service

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Disable Response to Broadcast ICMPv4 Echo Request

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Disable Response to ICMP Broadcast Netmask Requests

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Enable Strong TCP Sequence Number Generation

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4 Disable Response to ICMP Broadcast Timestamp Requests

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5 Disable Source Packet Forwarding

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Disable Directed Broadcast Packet Forwarding

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.7 Enable Stack Protection

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.8 Restrict Core Dumps to Protected Directory

MEDIA PROTECTION

3.9 Disable Response to ICMP Timestamp Requests

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.10 Disable Response to Multicast Echo Request

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.11 Ignore ICMP Redirect Messages

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.12 Set Strict Multihoming

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.13 Disable ICMP Redirect Messages

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.14 Disable TCP Reverse IP Source Routing

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.15 Set Maximum Number of Half-open TCP Connections

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.16 Set Maximum Number of Incoming Connections

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.17 Disable Network Routing

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Create CIS Audit Class

AUDIT AND ACCOUNTABILITY

4.2 Enable Auditing of Incoming Network Connections

AUDIT AND ACCOUNTABILITY

4.3 Enable Auditing of File Metadata Modification Events

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing

AUDIT AND ACCOUNTABILITY

5.1 Set Sticky Bit on World Writable Directories

ACCESS CONTROL, MEDIA PROTECTION

6.1 Disable login: Services on Serial Ports

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Set EEPROM Security Mode and Log Failed Access (SPARC)

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.3 Restrict at/cron to Authorized Users

ACCESS CONTROL, MEDIA PROTECTION

6.4 Set Default Screen Lock for GNOME Users

ACCESS CONTROL

6.5 Remove Autologin Capabilities from the GNOME desktop

ACCESS CONTROL

6.6 Set Delay between Failed Login Attempts to 4

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.7 Disable Rhost-based Authentication for SSH

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Restrict FTP Use

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.9 Disable root login for SSH

ACCESS CONTROL

6.10 Disable Host-based Authentication for Login-based Services

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.11 Blocking Authentication Using Empty/Null Passwords for SSH

IDENTIFICATION AND AUTHENTICATION

6.12 Limit Consecutive Login Attempts for SSH

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.13 Disable X11 Forwarding for SSH

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.14 Disable 'nobody' Access for RPC Encryption Key Storage Service

ACCESS CONTROL