CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG

Audit Details

Name: CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG

Updated: 10/13/2025

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 345

File Details

Filename: CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_STIG.audit

Size: 1.41 MB

MD5: 0d3a522ba0cd015b11326219aa3773c1
SHA256: d291ea480946cf55d318fc98c7e2db538a74233acd234a234442d7e92ee9e759

Audit Items

DescriptionCategories
1.1.1.1 Ensure cramfs kernel module is not available

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure usb-storage kernel module is not available

MEDIA PROTECTION

1.1.1.11 Ensure the operating system disables the ability to load the firewire-core kernel module

CONFIGURATION MANAGEMENT

1.1.1.12 Ensure a camera is not installed

CONFIGURATION MANAGEMENT

1.1.2.1.1 Ensure /tmp is a separate partition

CONFIGURATION MANAGEMENT

1.1.2.1.2 Ensure nodev option set on /tmp partition

CONFIGURATION MANAGEMENT

1.1.2.1.3 Ensure nosuid option set on /tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.1.4 Ensure noexec option set on /tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.2 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.4 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.4 Ensure a separate file system/partition has been created for non-privileged local interactive user home directories

CONFIGURATION MANAGEMENT

1.1.2.3.5 Ensure file systems that contain user home directories are mounted with the nosuid option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.6 Ensure file systems that contain user home directories are mounted with the "noexec" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /var

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmp

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.2 Ensure nodev option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.3 Ensure nosuid option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.4 Ensure noexec option set on /var/tmp partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.1 Ensure separate partition exists for /var/log

AUDIT AND ACCOUNTABILITY

1.1.2.6.2 Ensure nodev option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.3 Ensure nosuid option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.4 Ensure noexec option set on /var/log partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.1 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY

1.1.2.7.2 Ensure nodev option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.4 Ensure noexec option set on /var/log/audit partition

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.8.1 Ensure the "/boot" directory is mounted with the "nosuid" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.9.1 Ensure the "/boot/efi" directory is mounted with the "nosuid" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.10.1 Ensure file systems that are being NFS-imported are mounted with the "nodev" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.10.2 Ensure file systems being imported via NFS are mounted with the "nosuid" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.10.3 Ensure file systems being imported via NFS are mounted with the "noexec" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.11.1 Ensure nodev option set on removable media partitions

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.11.2 Ensure nosuid option set on removable media partitions

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.11.3 Ensure noexec option set on removable media partitions

CONFIGURATION MANAGEMENT

1.1.2.12 Ensure all non-root local partitions are mounted with the "nodev" option

ACCESS CONTROL, MEDIA PROTECTION

1.1.3.1 Ensure all information at rest is encrypted

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1.2 Ensure gpgcheck is globally activated

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.5 Ensure DNF is configured to perform a signature check on local packages

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.6 Ensure cryptographic verification of vendor software packages

SYSTEM AND INFORMATION INTEGRITY

1.2.2.2 Ensure vendor packaged system security patches and updates are installed

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2.3 Ensure Operating System is a vendor-supported release

SYSTEM AND INFORMATION INTEGRITY

1.2.2.4 Ensure the operating system removes all software components after updated versions have been installed

SYSTEM AND INFORMATION INTEGRITY

1.3.1.5 Ensure the SELinux mode is enforcing

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.8 Ensure the operating system has the policycoreutils package installed

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.10 Ensure SELinux prevents nonprivileged users from executing privileged functions

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.11 Ensure SELinux targeted policy is configured

ACCESS CONTROL, MEDIA PROTECTION

1.4.1 Ensure bootloader password is set

ACCESS CONTROL, MEDIA PROTECTION

1.4.3 Ensure the operating system requires authentication for rescue mode

IDENTIFICATION AND AUTHENTICATION

1.4.4 Ensure the operating system requires authentication upon booting into emergency mode

IDENTIFICATION AND AUTHENTICATION