Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG
Changelog
Revision 1.1
Changelog
Revision 1.1
Nov 4, 2025
Informational Update
1.1.1.1 Ensure cramfs kernel module is not available
1.1.1.9 Ensure usb-storage kernel module is not available
1.1.2.1.1 Ensure /tmp is a separate partition
1.1.2.1.2 Ensure nodev option set on /tmp partition
1.1.2.1.3 Ensure nosuid option set on /tmp partition
1.1.2.1.4 Ensure noexec option set on /tmp partition
1.1.2.2.2 Ensure nodev option set on /dev/shm partition
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
1.1.2.2.4 Ensure noexec option set on /dev/shm partition
1.1.2.4.1 Ensure separate partition exists for /var
1.1.2.5.1 Ensure separate partition exists for /var/tmp
1.1.2.5.2 Ensure nodev option set on /var/tmp partition
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
1.1.2.5.4 Ensure noexec option set on /var/tmp partition
1.1.2.6.1 Ensure separate partition exists for /var/log
1.1.2.6.2 Ensure nodev option set on /var/log partition
1.1.2.6.3 Ensure nosuid option set on /var/log partition
1.1.2.6.4 Ensure noexec option set on /var/log partition
1.1.2.7.1 Ensure separate partition exists for /var/log/audit
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
1.1.3.1 Ensure all information at rest is encrypted
1.2.1.2 Ensure gpgcheck is globally activated
1.2.1.6 Ensure cryptographic verification of vendor software packages
1.5.1 Ensure address space layout randomization is enabled
1.5.11 Ensure the operating system disables the use of user namespaces
1.5.12 Ensure kernel image loading is disabled
1.5.13 Ensure the operating system is configured to enable DAC on symlinks
1.5.15 Ensure the operating system is configured to enable DAC on hardlinks
1.5.17 Ensure the operating system is configured to restrict access to the kernel message buffer
1.5.19 Ensure the operating system is configured to prevent kernel profiling by unprivileged users
1.5.20 Ensure the operating system restricts usage of ptrace to descendant processes
1.5.21 Ensure the operating system prevents privilege escalation through the kernel by disabling access to the bpf syscall
1.5.8 Ensure the operating system enables hardening for the BPF JIT
2.2.6 Ensure krb5-workstation is not installed
3.2.4 Ensure sctp kernel module is not available
3.2.5 Ensure atm kernel module is not available
3.2.6 Ensure bluetooth kernel module is not available
3.2.7 Ensure can kernel module is not available
3.3.1 Ensure ip forwarding is disabled
3.3.11 Ensure ipv6 router advertisements are not accepted
3.3.2 Ensure packet redirect sending is disabled
3.3.4 Ensure broadcast icmp requests are ignored
3.3.5 Ensure icmp redirects are not accepted
3.3.7 Ensure reverse path filtering is enabled
3.3.8 Ensure source routed packets are not accepted
5.1.21 Ensure sshd PermitRootLogin is disabled
5.1.30 Ensure sshd is configured to use only FIPS-validated key exchange algorithms
5.1.37 Ensure sshd RekeyLimit is configured
5.2.9 Ensure sudo timestamp_timeout is configured
5.3.2.2 Ensure pam_faillock module is enabled
5.3.2.3 Ensure pam_pwquality module is enabled
5.3.3.2.4 Ensure password same consecutive characters is configured
5.3.3.4.1 Ensure pam_unix does not include nullok
5.3.3.4.5 Ensure pam_unix includes a FIPS 140-2 approved hashing algorithm
5.4.1.2 Ensure minimum password days is configured
5.4.1.7 Ensure passwords use FIPS 140-2 approved cryptographic hashing algorithm
5.4.1.8 Ensure minimum number of hashing rounds is configured
6.3.1.2 Ensure auditing for processes that start prior to auditd is enabled
6.3.2.3 Ensure system is disabled when audit logs are full
6.3.3.1 Ensure changes to system administration scope (sudoers) is collected
6.3.3.10 Ensure successful file system mounts are collected
6.3.3.12 Ensure login and logout events are collected
6.3.3.13 Ensure file deletion events by users are collected
6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collected
6.3.3.17 Ensure successful and unsuccessful attempts to use the chacl command are collected
6.3.3.18 Ensure successful and unsuccessful attempts to use the usermod command are collected
6.3.3.19 Ensure kernel module loading unloading and modification is collected
6.3.3.2 Ensure actions as another user are always logged
6.3.3.20 Ensure the audit configuration is immutable
6.3.3.22 Ensure successful and unsuccessful attempts to use the su command are collected
6.3.3.23 Ensure successful and unsuccessful attempts to use the sudo command are collected
6.3.3.24 Ensure successful and unsuccessful attempts to use the chsh command are collected
6.3.3.25 Ensure successful and unsuccessful attempts to use the crontab command are collected
6.3.3.26 Ensure successful and unsuccessful attempts to use the gpasswd command are collected
6.3.3.27 Ensure successful and unsuccessful attempts to use the newgrp command are collected
6.3.3.28 Ensure successful and unsuccessful attempts to use the pam_timestamp_check command are collected
6.3.3.29 Ensure successful and unsuccessful attempts to use the ssh-keysign command are collected
6.3.3.30 Ensure successful and unsuccessful attempts to use the unix_chkpwd command are collected
6.3.3.31 Ensure successful and unsuccessful attempts to use the setsebool command are collected
6.3.3.32 Ensure successful and unsuccessful attempts to use the userhelper command are collected
6.3.3.33 Ensure successful and unsuccessful attempts to use the setfiles command are collected
6.3.3.34 Ensure successful and unsuccessful attempts to use the semanage command are collected
6.3.3.35 Ensure successful and unsuccessful attempts to use the postqueue command are collected
6.3.3.36 Ensure successful and unsuccessful attempts to use the postdrop command are collected
6.3.3.37 Ensure successful and unsuccessful attempts to use the unix_update command are collected
6.3.3.38 Ensure successful and unsuccessful attempts to use the umount command are collected
6.3.3.39 Ensure successful and unsuccessful attempts to use the mount command are collected
6.3.3.40 Ensure successful and unsuccessful attempts to use the ssh-agent command are collected
6.3.3.41 Ensure successful and unsuccessful attempts to use the passwd command are collected
6.3.3.42 Ensure successful and unsuccessful attempts to use the chage command are collected
6.3.3.43 Ensure the audit system prevents unauthorized changes to logon UIDs
6.3.3.7 Ensure unsuccessful file access attempts are collected
6.3.3.8 Ensure events that modify user/group information are collected
6.3.3.9 Ensure discretionary access control permission modification events are collected
Miscellaneous
Metadata updated.