Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Rocky Linux 8 Server L1 v1.0.0
Changelog
Revision 1.16
Changelog
Revision 1.16
May 16, 2023
Functional Update
3.4.1.1 Ensure firewalld is installed - firewalld
3.4.1.1 Ensure firewalld is installed - iptables
3.4.1.2 Ensure iptables-services not installed with firewalld
3.4.1.3 Ensure nftables either not installed or masked with firewalld
3.4.1.3 Ensure nftables either not installed or masked with firewalld - inactive
3.4.1.3 Ensure nftables either not installed or masked with firewalld - installed
3.4.1.3 Ensure nftables either not installed or masked with firewalld - masked
3.4.1.4 Ensure firewalld service enabled and running - enabled
3.4.1.4 Ensure firewalld service enabled and running - running
3.4.1.5 Ensure firewalld default zone is set
3.4.1.6 Ensure network interfaces are assigned to appropriate zone
3.4.1.7 Ensure firewalld drops unnecessary services and ports
3.4.2.1 Ensure nftables is installed
3.4.2.10 Ensure nftables service is enabled
3.4.2.11 Ensure nftables rules are permanent - forward
3.4.2.11 Ensure nftables rules are permanent - input
3.4.2.11 Ensure nftables rules are permanent - output
3.4.2.2 Ensure firewalld is either not installed or masked with nftables
3.4.2.2 Ensure firewalld is either not installed or masked with nftables - masked
3.4.2.2 Ensure firewalld is either not installed or masked with nftables - stopped
3.4.2.3 Ensure iptables-services not installed with nftables
3.4.2.4 Ensure iptables are flushed with nftables - ip6tables
3.4.2.4 Ensure iptables are flushed with nftables - iptables
3.4.2.5 Ensure an nftables table exists
3.4.2.6 Ensure nftables base chains exist - hook forward
3.4.2.6 Ensure nftables base chains exist - hook input
3.4.2.6 Ensure nftables base chains exist - hook output
3.4.2.7 Ensure nftables loopback traffic is configured - 'iif lo accept'
3.4.2.7 Ensure nftables loopback traffic is configured - 'ip saddr'
3.4.2.7 Ensure nftables loopback traffic is configured - 'ip sddr'
3.4.2.7 Ensure nftables loopback traffic is configured - 'ip6 saddr'
3.4.2.7 Ensure nftables loopback traffic is configured - 'ip6 sddr'
3.4.2.8 Ensure nftables outbound and established connections are configured - input
3.4.2.8 Ensure nftables outbound and established connections are configured - output
3.4.2.9 Ensure nftables default deny firewall policy - hook forward
3.4.2.9 Ensure nftables default deny firewall policy - hook input
3.4.2.9 Ensure nftables default deny firewall policy - hook output
3.4.3.1.1 Ensure iptables packages are installed
3.4.3.1.2 Ensure nftables is not installed with iptables
3.4.3.1.3 Ensure firewalld is either not installed or masked with iptables
3.4.3.2.1 Ensure iptables loopback traffic is configured - INPUT
3.4.3.2.1 Ensure iptables loopback traffic is configured - OUTPUT
3.4.3.2.2 Ensure iptables outbound and established connections are configured
3.4.3.2.3 Ensure iptables rules exist for all open ports
3.4.3.2.4 Ensure iptables default deny firewall policy - Chain FORWARD
3.4.3.2.4 Ensure iptables default deny firewall policy - Chain INPUT
3.4.3.2.4 Ensure iptables default deny firewall policy - Chain OUTPUT
3.4.3.2.5 Ensure iptables rules are saved
3.4.3.2.6 Ensure iptables is enabled and active - active
3.4.3.2.6 Ensure iptables is enabled and active - enabled
3.4.3.3.1 Ensure ip6tables loopback traffic is configured - INPUT
3.4.3.3.1 Ensure ip6tables loopback traffic is configured - OUTPUT
3.4.3.3.2 Ensure ip6tables outbound and established connections are configured
3.4.3.3.3 Ensure ip6tables firewall rules exist for all open ports
3.4.3.3.4 Ensure ip6tables default deny firewall policy - Chain FORWARD
3.4.3.3.4 Ensure ip6tables default deny firewall policy - Chain INPUT
3.4.3.3.4 Ensure ip6tables default deny firewall policy - Chain OUTPUT
3.4.3.3.5 Ensure ip6tables rules are saved
3.4.3.3.6 Ensure ip6tables is enabled and active - active
3.4.3.3.6 Ensure ip6tables is enabled and active - enabled
4.2.1.1 Ensure rsyslog is installed
4.2.1.2 Ensure rsyslog service is enabled
4.2.1.3 Ensure journald is configured to send logs to rsyslog
4.2.1.4 Ensure rsyslog default file permissions are configured
4.2.1.5 Ensure logging is configured
4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
4.2.2.1.1 Ensure systemd-journal-remote is installed
4.2.2.1.3 Ensure systemd-journal-remote is enabled
4.2.2.2 Ensure journald service is enabled
4.2.2.3 Ensure journald is configured to compress large log files
4.2.2.4 Ensure journald is configured to write logfiles to persistent disk
4.2.2.5 Ensure journald is not configured to send logs to rsyslog
4.2.2.6 Ensure journald log rotation is configured per site policy
4.2.2.7 Ensure journald default file permissions configured
5.6.1.1 Ensure password expiration is 365 days or less - users
5.6.1.2 Ensure minimum days between password changes is 7 or more - users
5.6.1.3 Ensure password expiration warning days is 7 or more - users
5.6.1.4 Ensure inactive password lock is 30 days or less - useradd
5.6.1.4 Ensure inactive password lock is 30 days or less - users
Informational Update
4.2.1.1 Ensure rsyslog is installed
4.2.1.2 Ensure rsyslog service is enabled
4.2.1.3 Ensure journald is configured to send logs to rsyslog
4.2.1.5 Ensure logging is configured
4.2.2.1.1 Ensure systemd-journal-remote is installed
4.2.2.1.3 Ensure systemd-journal-remote is enabled
4.2.2.2 Ensure journald service is enabled
4.2.2.3 Ensure journald is configured to compress large log files
4.2.2.4 Ensure journald is configured to write logfiles to persistent disk
4.2.2.5 Ensure journald is not configured to send logs to rsyslog
4.2.2.6 Ensure journald log rotation is configured per site policy
4.2.2.7 Ensure journald default file permissions configured
Miscellaneous
Variables updated.
Added
4.2.1.7 Ensure rsyslog is not configured to recieve logs from a remote client - imtcp
4.2.1.7 Ensure rsyslog is not configured to recieve logs from a remote client - imtcp 514
4.2.2.1.2 Ensure systemd-journal-remote is configured - Cert
4.2.2.1.2 Ensure systemd-journal-remote is configured - Key
4.2.2.1.2 Ensure systemd-journal-remote is configured - Trusted Cert
4.2.2.1.2 Ensure systemd-journal-remote is configured - URL
4.2.2.1.4 Ensure journald is not configured to recieve logs from a remote client
Removed
4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote client - InputTCPServerRun
4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote client - imtcp
4.2.2.1.2 Ensure systemd-journal-remote is configured
4.2.2.1.4 Ensure journald is not configured to receive logs from a remote client