Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server
Changelog
Revision 1.10
Changelog
Revision 1.10
Oct 24, 2025
Functional Update
1.1.2.1.2 Ensure nodev option set on /tmp partition
1.1.2.1.3 Ensure nosuid option set on /tmp partition
1.1.2.1.4 Ensure noexec option set on /tmp partition
1.1.2.2.1 Ensure /dev/shm is a separate partition
1.1.2.2.2 Ensure nodev option set on /dev/shm partition
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
1.1.2.2.4 Ensure noexec option set on /dev/shm partition
1.1.2.3.2 Ensure nodev option set on /home partition
1.1.2.3.3 Ensure nosuid option set on /home partition
1.1.2.4.2 Ensure nodev option set on /var partition
1.1.2.4.3 Ensure nosuid option set on /var partition
1.1.2.5.2 Ensure nodev option set on /var/tmp partition
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
1.1.2.5.4 Ensure noexec option set on /var/tmp partition
1.1.2.6.2 Ensure nodev option set on /var/log partition
1.1.2.6.3 Ensure nosuid option set on /var/log partition
1.1.2.6.4 Ensure noexec option set on /var/log partition
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
1.6.2 Ensure system wide crypto policy is not set in sshd configuration
5.1.1 Ensure permissions on /etc/ssh/sshd_config are configured
5.1.12 Ensure sshd HostbasedAuthentication is disabled
5.1.13 Ensure sshd IgnoreRhosts is enabled
5.1.15 Ensure sshd LogLevel is configured
5.1.16 Ensure sshd MaxAuthTries is configured
5.1.18 Ensure sshd MaxSessions is configured
5.1.19 Ensure sshd PermitEmptyPasswords is disabled
5.1.20 Ensure sshd PermitRootLogin is disabled
5.1.21 Ensure sshd PermitUserEnvironment is disabled
5.1.3 Ensure permissions on SSH public host key files are configured
5.1.8 Ensure sshd Banner is configured
5.1.9 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
5.2.5 Ensure re-authentication for privilege escalation is not disabled globally
5.3.3.2.2 Ensure password length is configured
5.3.3.2.4 Ensure password same consecutive characters is configured
Informational Update
1.1.1.1 Ensure cramfs kernel module is not available
1.1.1.2 Ensure freevxfs kernel module is not available
1.1.1.3 Ensure hfs kernel module is not available
1.1.1.4 Ensure hfsplus kernel module is not available
1.1.1.5 Ensure jffs2 kernel module is not available
1.1.1.8 Ensure usb-storage kernel module is not available
1.1.1.9 Ensure unused filesystems kernel modules are not available
1.1.2.1.1 Ensure /tmp is a separate partition
1.1.2.2.1 Ensure /dev/shm is a separate partition
1.2.1.2 Ensure gpgcheck is globally activated
1.3.1.2 Ensure SELinux is not disabled in bootloader configuration
1.5.3 Ensure core dump backtraces are disabled
1.5.4 Ensure core dump storage is disabled
1.6.2 Ensure system wide crypto policy is not set in sshd configuration
1.6.3 Ensure system wide crypto policy disables sha1 hash and signature support
1.6.4 Ensure system wide crypto policy disables macs less than 128 bits
1.6.5 Ensure system wide crypto policy disables cbc for ssh
1.6.6 Ensure system wide crypto policy disables chacha20-poly1305 for ssh
1.6.7 Ensure system wide crypto policy disables EtM for ssh
1.7.1 Ensure message of the day is configured properly
1.7.2 Ensure local login warning banner is configured properly
1.7.3 Ensure remote login warning banner is configured properly
1.8.2 Ensure GDM login banner is configured
1.8.3 Ensure GDM disable-user-list option is enabled
1.8.4 Ensure GDM screen locks when the user is idle
1.8.5 Ensure GDM screen locks cannot be overridden
1.8.6 Ensure GDM automatic mounting of removable media is disabled
1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden
1.8.8 Ensure GDM autorun-never is enabled
1.8.9 Ensure GDM autorun-never is not overridden
2.3.2 Ensure chrony is configured
2.4.1.1 Ensure cron daemon is enabled and active
2.4.2.1 Ensure at is restricted to authorized users
3.1.2 Ensure wireless interfaces are disabled
3.3.1 Ensure ip forwarding is disabled
3.3.10 Ensure tcp syn cookies is enabled
3.3.11 Ensure ipv6 router advertisements are not accepted
3.3.2 Ensure packet redirect sending is disabled
3.3.3 Ensure bogus icmp responses are ignored
3.3.4 Ensure broadcast icmp requests are ignored
3.3.5 Ensure icmp redirects are not accepted
3.3.6 Ensure secure icmp redirects are not accepted
3.3.7 Ensure reverse path filtering is enabled
3.3.8 Ensure source routed packets are not accepted
3.3.9 Ensure suspicious packets are logged
4.1.2 Ensure a single firewall configuration utility is in use
4.2.2 Ensure firewalld loopback traffic is configured
4.3.1 Ensure nftables base chains exist
4.3.3 Ensure nftables default deny firewall policy
4.3.4 Ensure nftables loopback traffic is configured
5.1.1 Ensure permissions on /etc/ssh/sshd_config are configured
5.1.2 Ensure permissions on SSH private host key files are configured
5.1.3 Ensure permissions on SSH public host key files are configured
5.1.4 Ensure sshd Ciphers are configured
5.1.5 Ensure sshd KexAlgorithms is configured
5.1.6 Ensure sshd MACs are configured
5.1.8 Ensure sshd Banner is configured
5.3.2.2 Ensure pam_faillock module is enabled
5.3.2.3 Ensure pam_pwquality module is enabled
5.3.2.4 Ensure pam_pwhistory module is enabled
5.3.2.5 Ensure pam_unix module is enabled
5.3.3.1.1 Ensure password failed attempts lockout is configured
5.3.3.1.2 Ensure password unlock time is configured
5.3.3.2.1 Ensure password number of changed characters is configured
5.3.3.2.2 Ensure password length is configured
5.3.3.2.3 Ensure password complexity is configured
5.3.3.2.4 Ensure password same consecutive characters is configured
5.3.3.2.5 Ensure password maximum sequential characters is configured
5.3.3.2.6 Ensure password dictionary check is enabled
5.3.3.2.7 Ensure password quality is enforced for the root user
5.3.3.3.1 Ensure password history remember is configured
5.3.3.3.3 Ensure pam_pwhistory includes use_authtok
5.3.3.4.1 Ensure pam_unix does not include nullok
5.3.3.4.2 Ensure pam_unix does not include remember
5.3.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
5.3.3.4.4 Ensure pam_unix includes use_authtok
5.4.1.1 Ensure password expiration is configured
5.4.1.3 Ensure password expiration warning days is configured
5.4.1.5 Ensure inactive password lock is configured
5.4.2.7 Ensure system accounts do not have a valid login shell
5.4.2.8 Ensure accounts without a valid login shell are locked
5.4.3.2 Ensure default user shell timeout is configured
5.4.3.3 Ensure default user umask is configured
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
6.2.2.2 Ensure journald ForwardToSyslog is disabled
6.2.2.3 Ensure journald Compress is configured
6.2.2.4 Ensure journald Storage is configured
6.2.3.3 Ensure journald is configured to send logs to rsyslog
6.2.4.1 Ensure access to all logfiles has been configured
7.1.11 Ensure world writable files and directories are secured
7.2.8 Ensure local interactive user home directories are configured
7.2.9 Ensure local interactive user dot files access is configured
Miscellaneous
Metadata updated.
Variables updated.