CIS Red Hat EL7 Workstation L1 v3.1.1

Audit Details

Name: CIS Red Hat EL7 Workstation L1 v3.1.1

Updated: 6/29/2022

Authority: CIS

Plugin: Unix

Revision: 1.7

Estimated Item Count: 322

File Details

Filename: CIS_Red_Hat_EL7_v3.1.1_Workstation_L1.audit

Size: 928 kB

MD5: 5cb713029086a26907ba5db5548175d8
SHA256: b8fd95fd0dcc94b9fdbb550f21a03b6dacdca29ebc9ea04efcf3627fe941c054

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of udf filesystems is disabled - lsmod

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of udf filesystems is disabled - modprobe

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.2 Ensure /tmp is configured

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure noexec option set on /tmp partition

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure nodev option set on /tmp partition

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure nosuid option set on /tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.6 Ensure /dev/shm is configured - fstab

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.6 Ensure /dev/shm is configured - mount

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.7 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.8 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.9 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.12 Ensure /var/tmp partition includes the noexec option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.13 Ensure /var/tmp partition includes the nodev option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.14 Ensure /var/tmp partition includes the nosuid option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.18 Ensure /home partition includes the nodev option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.19 Ensure removable media partitions include noexec option

ACCESS CONTROL, MEDIA PROTECTION

1.1.20 Ensure nodev option set on removable media partitions

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.21 Ensure nosuid option set on removable media partitions

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.1.22 Ensure sticky bit is set on all world-writable directories

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.2.1 Ensure GPG keys are configured

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure package manager repositories are configured

SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activated

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configured

SYSTEM AND INFORMATION INTEGRITY

1.2.5 Disable the rhnsd Daemon

CONFIGURATION MANAGEMENT

1.3.1 Ensure AIDE is installed

AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - cron

AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.service

AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.timer

AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - systemctl status aidecheck.timer

AUDIT AND ACCOUNTABILITY

1.4.1 Ensure bootloader password is set

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.2 Ensure permissions on bootloader config are configured - grub.cfg

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.2 Ensure permissions on bootloader config are configured - user.cfg

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.3 Ensure authentication required for single user mode - emergency.service

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.3 Ensure authentication required for single user mode - rescue.service

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dumps are restricted - limits.conf limits.d

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dumps are restricted - sysctl

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dumps are restricted - sysctl.conf sysctl.d

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dumps are restricted - systemd-coredump ProcessSizeMax

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure core dumps are restricted - systemd-coredump Storage

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.5.2 Ensure XD/NX support is enabled

CONFIGURATION MANAGEMENT

1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl

CONFIGURATION MANAGEMENT

1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d

CONFIGURATION MANAGEMENT

1.5.4 Ensure prelink is not installed

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.6.1.1 Ensure SELinux is installed

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure SELinux is not disabled in bootloader configuration

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configured - sestatus

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/config

ACCESS CONTROL, MEDIA PROTECTION