CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG

Audit Details

Name: CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG

Updated: 12/29/2025

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 345

File Details

Filename: CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_STIG.audit

Size: 1.31 MB

MD5: f5e8afe68957f5acd3cbd4151ae14c7b
SHA256: 4a941fc49a40076d02693ecf8d9defb061e66d2cccdda3e8c40c4054253b31f5

Audit Items

DescriptionCategories
1.1.1.1 Ensure cramfs kernel module is not available

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure usb-storage kernel module is not available

MEDIA PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.1.1.11 Ensure the operating system disables the ability to load the firewire-core kernel module

CONFIGURATION MANAGEMENT

1.1.1.12 Ensure a camera is not installed

CONFIGURATION MANAGEMENT

1.1.2.1.1 Ensure /tmp is a separate partition

CONFIGURATION MANAGEMENT

1.1.2.1.2 Ensure nodev option set on /tmp partition

CONFIGURATION MANAGEMENT

1.1.2.1.3 Ensure nosuid option set on /tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.1.4 Ensure noexec option set on /tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.2.2 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.2.4 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.3.4 Ensure a separate file system/partition has been created for non-privileged local interactive user home directories

CONFIGURATION MANAGEMENT

1.1.2.3.5 Ensure file systems that contain user home directories are mounted with the nosuid option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.3.6 Ensure file systems that contain user home directories are mounted with the "noexec" option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /var

CONFIGURATION MANAGEMENT

1.1.2.5.1 Ensure separate partition exists for /var/tmp

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.5.2 Ensure nodev option set on /var/tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.5.3 Ensure nosuid option set on /var/tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.5.4 Ensure noexec option set on /var/tmp partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.6.1 Ensure separate partition exists for /var/log

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.1.2.6.2 Ensure nodev option set on /var/log partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.6.3 Ensure nosuid option set on /var/log partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.6.4 Ensure noexec option set on /var/log partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.7.1 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.1.2.7.2 Ensure nodev option set on /var/log/audit partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.7.4 Ensure noexec option set on /var/log/audit partition

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.8.1 Ensure the "/boot" directory is mounted with the "nosuid" option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.9.1 Ensure the "/boot/efi" directory is mounted with the "nosuid" option

CONFIGURATION MANAGEMENT

1.1.2.10.1 Ensure file systems that are being NFS-imported are mounted with the "nodev" option

CONFIGURATION MANAGEMENT

1.1.2.10.2 Ensure file systems being imported via NFS are mounted with the "nosuid" option

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.10.3 Ensure file systems being imported via NFS are mounted with the "noexec" option

CONFIGURATION MANAGEMENT

1.1.2.11.1 Ensure nodev option set on removable media partitions

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.11.2 Ensure nosuid option set on removable media partitions

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

1.1.2.11.3 Ensure noexec option set on removable media partitions

CONFIGURATION MANAGEMENT

1.1.2.12 Ensure all non-root local partitions are mounted with the "nodev" option

CONFIGURATION MANAGEMENT

1.1.3.1 Ensure all information at rest is encrypted

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1.2 Ensure gpgcheck is globally activated

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.5 Ensure DNF is configured to perform a signature check on local packages

CONFIGURATION MANAGEMENT

1.2.1.6 Ensure cryptographic verification of vendor software packages

CONFIGURATION MANAGEMENT

1.2.2.2 Ensure vendor packaged system security patches and updates are installed

CONFIGURATION MANAGEMENT

1.2.2.3 Ensure Operating System is a vendor-supported release

CONFIGURATION MANAGEMENT

1.2.2.4 Ensure the operating system removes all software components after updated versions have been installed

SYSTEM AND INFORMATION INTEGRITY

1.3.1.5 Ensure the SELinux mode is enforcing

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.3.1.8 Ensure the operating system has the policycoreutils package installed

ACCESS CONTROL, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.1.10 Ensure SELinux prevents nonprivileged users from executing privileged functions

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.11 Ensure SELinux targeted policy is configured

SYSTEM AND INFORMATION INTEGRITY

1.4.1 Ensure bootloader password is set

ACCESS CONTROL, MEDIA PROTECTION

1.4.3 Ensure the operating system requires authentication for rescue mode

ACCESS CONTROL

1.4.4 Ensure the operating system requires authentication upon booting into emergency mode

ACCESS CONTROL