CIS Rocky Linux 8 Workstation L1 v2.0.0

Audit Details

Name: CIS Rocky Linux 8 Workstation L1 v2.0.0

Updated: 8/12/2025

Authority: CIS

Plugin: Unix

Revision: 1.17

Estimated Item Count: 220

File Details

Filename: CIS_Rocky_Linux_8_v2.0.0_L1_Workstation.audit

Size: 1.02 MB

MD5: e7197cd09a41a0657d76480a00a610ae
SHA256: 528a82c5e2ca9f7753390bcb252150355b0d2d891d5ba1895486def5a5364644

Audit Changelog

 
Revision 1.17

Aug 12, 2025

Functional Update
  • 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
  • 4.2.10 Ensure sshd IgnoreRhosts is enabled
  • 4.2.13 Ensure sshd LogLevel is configured
  • 4.2.15 Ensure sshd MaxAuthTries is configured
  • 4.2.16 Ensure sshd MaxSessions is configured
  • 4.2.17 Ensure sshd MaxStartups is configured
  • 4.2.18 Ensure sshd PermitEmptyPasswords is disabled
  • 4.2.19 Ensure sshd PermitRootLogin is disabled
  • 4.2.2 Ensure permissions on SSH private host key files are configured
  • 4.2.20 Ensure sshd PermitUserEnvironment is disabled
  • 4.2.21 Ensure sshd UsePAM is enabled
  • 4.2.22 Ensure sshd crypto_policy is not set
  • 4.2.3 Ensure permissions on SSH public host key files are configured
  • 4.2.9 Ensure sshd HostbasedAuthentication is disabled
Informational Update
  • 1.1.1.1 Ensure cramfs kernel module is not available
  • 1.1.1.2 Ensure freevxfs kernel module is not available
  • 1.1.1.3 Ensure hfs kernel module is not available
  • 1.1.1.4 Ensure hfsplus kernel module is not available
  • 1.1.1.5 Ensure jffs2 kernel module is not available
  • 1.1.2.1.1 Ensure /tmp is a separate partition
  • 1.1.2.2.1 Ensure /dev/shm is a separate partition
  • 1.2.2 Ensure gpgcheck is globally activated
  • 1.5.1.2 Ensure SELinux is not disabled in bootloader configuration
  • 1.6.2 Ensure system wide crypto policy disables sha1 hash and signature support
  • 1.6.3 Ensure system wide crypto policy disables cbc for ssh
  • 1.6.4 Ensure system wide crypto policy disables macs less than 128 bits
  • 1.7.1 Ensure message of the day is configured properly
  • 1.7.2 Ensure local login warning banner is configured properly
  • 1.7.3 Ensure remote login warning banner is configured properly
  • 1.8.2 Ensure GDM login banner is configured
  • 1.8.3 Ensure GDM disable-user-list option is enabled
  • 1.8.4 Ensure GDM screen locks when the user is idle
  • 1.8.5 Ensure GDM screen locks cannot be overridden
  • 1.8.8 Ensure GDM autorun-never is enabled
  • 1.8.9 Ensure GDM autorun-never is not overridden
  • 2.1.2 Ensure chrony is configured
  • 3.4.1.2 Ensure a single firewall configuration utility is in use
  • 3.4.2.1 Ensure nftables base chains exist
  • 3.4.2.2 Ensure host based firewall loopback traffic is configured
  • 3.4.2.5 Ensure nftables default deny firewall policy
  • 4.1.2.1 Ensure at is restricted to authorized users
  • 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
  • 4.2.2 Ensure permissions on SSH private host key files are configured
  • 4.2.22 Ensure sshd crypto_policy is not set
  • 4.2.3 Ensure permissions on SSH public host key files are configured
  • 4.3.2 Ensure sudo commands use pty
  • 4.4.2.2 Ensure pam_faillock module is enabled
  • 4.4.2.3 Ensure pam_pwquality module is enabled
  • 4.4.2.4 Ensure pam_pwhistory module is enabled
  • 4.4.2.5 Ensure pam_unix module is enabled
  • 4.4.3.1.1 Ensure password failed attempts lockout is configured
  • 4.4.3.1.2 Ensure password unlock time is configured
  • 4.4.3.2.1 Ensure password number of changed characters is configured
  • 4.4.3.2.2 Ensure password length is configured
  • 4.4.3.2.3 Ensure password complexity is configured
  • 4.4.3.2.4 Ensure password same consecutive characters is configured
  • 4.4.3.2.5 Ensure password maximum sequential characters is configured
  • 4.4.3.2.6 Ensure password dictionary check is enabled
  • 4.4.3.2.7 Ensure password quality is enforced for the root user
  • 4.4.3.3.1 Ensure password history remember is configured
  • 4.4.3.3.3 Ensure pam_pwhistory includes use_authtok
  • 4.4.3.4.1 Ensure pam_unix does not include nullok
  • 4.4.3.4.2 Ensure pam_unix does not include remember
  • 4.4.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
  • 4.4.3.4.4 Ensure pam_unix includes use_authtok
  • 4.5.2.3 Ensure system accounts are secured
  • 4.5.3.2 Ensure default user shell timeout is configured
  • 4.5.3.3 Ensure default user umask is configured
  • 5.1.1.3 Ensure journald is configured to send logs to rsyslog
  • 5.1.4 Ensure all logfiles have appropriate access configured
  • 6.1.11 Ensure world writable files and directories are secured
  • 6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
  • 6.2.10 Ensure local interactive user home directories are configured
  • 6.2.11 Ensure local interactive user dot files access is configured
Miscellaneous
  • Metadata updated.
  • Variables updated.
Revision 1.16

Aug 5, 2025

Functional Update
  • 4.3.3 Ensure sudo log file exists
Revision 1.15

Aug 1, 2025

Functional Update
  • 1.3.1 Ensure bootloader password is set
Revision 1.14

Jun 25, 2025

Functional Update
  • 2.2.18 Ensure web server services are not in use
  • 2.2.8 Ensure message access server services are not in use
Revision 1.13

Jun 11, 2025

Functional Update
  • 4.3.2 Ensure sudo commands use pty
Revision 1.12

Jan 29, 2025

Functional Update
  • 1.2.5 Ensure updates, patches, and additional security software are installed
Miscellaneous
  • References updated.
Revision 1.11

Jan 6, 2025

Informational Update
  • 1.1.1.1 Ensure cramfs kernel module is not available
  • 1.1.1.2 Ensure freevxfs kernel module is not available
  • 1.1.1.3 Ensure hfs kernel module is not available
  • 1.1.1.4 Ensure hfsplus kernel module is not available
  • 1.1.1.5 Ensure jffs2 kernel module is not available
  • 1.3.2 Ensure permissions on bootloader config are configured
  • 1.5.1.2 Ensure SELinux is not disabled in bootloader configuration
  • 1.8.2 Ensure GDM login banner is configured
  • 1.8.5 Ensure GDM screen locks cannot be overridden
  • 1.8.8 Ensure GDM autorun-never is enabled
  • 1.8.9 Ensure GDM autorun-never is not overridden
  • 3.4.1.2 Ensure a single firewall configuration utility is in use
  • 3.4.2.2 Ensure host based firewall loopback traffic is configured
  • 3.4.2.4 Ensure nftables established connections are configured
  • 4.1.1.8 Ensure crontab is restricted to authorized users
  • 4.1.2.1 Ensure at is restricted to authorized users
  • 4.2.2 Ensure permissions on SSH private host key files are configured
  • 4.2.3 Ensure permissions on SSH public host key files are configured
  • 4.4.3.2.1 Ensure password number of changed characters is configured
  • 4.4.3.2.2 Ensure password length is configured
  • 4.4.3.2.3 Ensure password complexity is configured
  • 4.4.3.2.4 Ensure password same consecutive characters is configured
  • 4.4.3.2.5 Ensure password maximum sequential characters is configured
  • 4.4.3.2.6 Ensure password dictionary check is enabled
  • 4.4.3.3.3 Ensure pam_pwhistory includes use_authtok
  • 4.4.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
  • 4.4.3.4.4 Ensure pam_unix includes use_authtok
  • 4.5.2.3 Ensure system accounts are secured
  • 4.5.3.3 Ensure default user umask is configured
  • 5.1.4 Ensure all logfiles have appropriate access configured
  • 6.1.11 Ensure world writable files and directories are secured
  • 6.1.3 Ensure permissions on /etc/opasswd are configured
  • 6.2.10 Ensure local interactive user home directories are configured
  • 6.2.11 Ensure local interactive user dot files access is configured
Miscellaneous
  • Metadata updated.
Revision 1.10

Nov 6, 2024

Functional Update
  • 6.1.11 Ensure world writable files and directories are secured
  • 6.1.12 Ensure no unowned or ungrouped files or directories exist
  • 6.1.13 Ensure SUID and SGID files are reviewed
Revision 1.9

Nov 4, 2024

Functional Update
  • 5.3.2 Ensure filesystem integrity is regularly checked
Revision 1.8

Aug 26, 2024

Functional Update
  • 4.5.2.4 Ensure root password is set
Miscellaneous
  • References updated.