1.1.2.1 Ensure /tmp is a separate partition - config check | CONFIGURATION MANAGEMENT |
1.1.2.1 Ensure /tmp is a separate partition - mount check | CONFIGURATION MANAGEMENT |
1.1.2.2 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.2.3 Ensure noexec option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.3.2 Ensure nodev option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.3.3 Ensure nosuid option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.4.2 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.4.3 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.4.4 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5.2 Ensure nodev option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5.3 Ensure noexec option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5.4 Ensure nosuid option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.6.2 Ensure noexec option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.6.3 Ensure nodev option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.6.4 Ensure nosuid option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.7.2 Ensure nodev option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.7.3 Ensure nosuid option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.8.1 Ensure /dev/shm is a separate partition | CONFIGURATION MANAGEMENT |
1.1.8.2 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.8.3 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.8.4 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.2.1 Ensure GPG keys are configured - gpgkey | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1 Ensure GPG keys are configured - show rpm keys | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure gpgcheck is globally activated - /etc/yum.repos.d/* | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure gpgcheck is globally activated - dnf.conf | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked - cron | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.service | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked - systemctl is-enabled aidecheck.timer | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked - systemctl status aidecheck.timer | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl | AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearch | AUDIT AND ACCOUNTABILITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace | AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure bootloader password is set | ACCESS CONTROL, MEDIA PROTECTION |
1.4.2 Ensure permissions on bootloader config are configured - grub.cfg | ACCESS CONTROL, MEDIA PROTECTION |
1.4.2 Ensure permissions on bootloader config are configured - grubenv | ACCESS CONTROL, MEDIA PROTECTION |
1.4.2 Ensure permissions on bootloader config are configured - user.cfg | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1 Ensure core dump storage is disabled | ACCESS CONTROL |
1.5.2 Ensure core dump backtraces are disabled | ACCESS CONTROL |
1.5.3 Ensure address space layout randomization (ASLR) is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is installed | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - sestatus | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is not disabled - /etc/selinux/config | ACCESS CONTROL, MEDIA PROTECTION |