Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Rocky Linux 9 v2.0.0 L1 Server
Changelog
Revision 1.10
Changelog
Revision 1.10
Nov 14, 2025
Functional Update
5.4.1.5 Ensure inactive password lock is configured
Informational Update
1.1.1.1 Ensure cramfs kernel module is not available
1.1.1.2 Ensure freevxfs kernel module is not available
1.1.1.3 Ensure hfs kernel module is not available
1.1.1.4 Ensure hfsplus kernel module is not available
1.1.1.5 Ensure jffs2 kernel module is not available
1.1.1.8 Ensure usb-storage kernel module is not available
1.1.1.9 Ensure unused filesystems kernel modules are not available
1.1.2.1.1 Ensure /tmp is a separate partition
1.1.2.1.2 Ensure nodev option set on /tmp partition
1.1.2.1.3 Ensure nosuid option set on /tmp partition
1.1.2.1.4 Ensure noexec option set on /tmp partition
1.1.2.2.1 Ensure /dev/shm is a separate partition
1.1.2.2.2 Ensure nodev option set on /dev/shm partition
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
1.1.2.2.4 Ensure noexec option set on /dev/shm partition
1.1.2.3.2 Ensure nodev option set on /home partition
1.1.2.3.3 Ensure nosuid option set on /home partition
1.1.2.4.2 Ensure nodev option set on /var partition
1.1.2.4.3 Ensure nosuid option set on /var partition
1.1.2.5.2 Ensure nodev option set on /var/tmp partition
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
1.1.2.5.4 Ensure noexec option set on /var/tmp partition
1.1.2.6.2 Ensure nodev option set on /var/log partition
1.1.2.6.3 Ensure nosuid option set on /var/log partition
1.1.2.6.4 Ensure noexec option set on /var/log partition
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
1.2.1.2 Ensure gpgcheck is globally activated
1.4.2 Ensure access to bootloader config is configured
1.5.1 Ensure address space layout randomization is enabled
1.5.2 Ensure ptrace_scope is restricted
1.5.3 Ensure core dump backtraces are disabled
1.5.4 Ensure core dump storage is disabled
1.6.1 Ensure system wide crypto policy is not set to legacy
1.6.3 Ensure system wide crypto policy disables sha1 hash and signature support
1.6.4 Ensure system wide crypto policy disables macs less than 128 bits
1.6.5 Ensure system wide crypto policy disables cbc for ssh
1.6.6 Ensure system wide crypto policy disables chacha20-poly1305 for ssh
1.6.7 Ensure system wide crypto policy disables EtM for ssh
1.7.1 Ensure message of the day is configured properly
1.7.2 Ensure local login warning banner is configured properly
1.7.3 Ensure remote login warning banner is configured properly
2.1.11 Ensure print server services are not in use
2.1.12 Ensure rpcbind services are not in use
2.1.13 Ensure rsync services are not in use
2.1.14 Ensure snmp services are not in use
2.1.16 Ensure tftp server services are not in use
2.1.18 Ensure web server services are not in use
2.1.19 Ensure xinetd services are not in use
2.1.2 Ensure avahi daemon services are not in use
2.1.3 Ensure dhcp server services are not in use
2.1.8 Ensure message access server services are not in use
2.4.1.7 Ensure permissions on /etc/cron.d are configured
2.4.1.8 Ensure crontab is restricted to authorized users
2.4.2.1 Ensure at is restricted to authorized users
3.1.3 Ensure bluetooth services are not in use
3.3.1 Ensure ip forwarding is disabled
3.3.10 Ensure tcp syn cookies is enabled
3.3.11 Ensure ipv6 router advertisements are not accepted
3.3.2 Ensure packet redirect sending is disabled
3.3.3 Ensure bogus icmp responses are ignored
3.3.4 Ensure broadcast icmp requests are ignored
3.3.5 Ensure icmp redirects are not accepted
3.3.6 Ensure secure icmp redirects are not accepted
3.3.7 Ensure reverse path filtering is enabled
3.3.8 Ensure source routed packets are not accepted
3.3.9 Ensure suspicious packets are logged
4.3.3 Ensure nftables default deny firewall policy
5.1.1 Ensure permissions on /etc/ssh/sshd_config are configured
5.1.12 Ensure sshd HostbasedAuthentication is disabled
5.1.13 Ensure sshd IgnoreRhosts is enabled
5.1.20 Ensure sshd PermitRootLogin is disabled
5.1.22 Ensure sshd UsePAM is enabled
5.1.4 Ensure sshd Ciphers are configured
5.1.5 Ensure sshd KexAlgorithms is configured
5.1.6 Ensure sshd MACs are configured
5.1.7 Ensure sshd access is configured
5.1.8 Ensure sshd Banner is configured
5.1.9 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
5.2.1 Ensure sudo is installed
5.2.2 Ensure sudo commands use pty
5.2.3 Ensure sudo log file exists
5.2.6 Ensure sudo authentication timeout is configured correctly
5.2.7 Ensure access to the su command is restricted
5.3.2.2 Ensure pam_faillock module is enabled
5.3.2.3 Ensure pam_pwquality module is enabled
5.3.2.4 Ensure pam_pwhistory module is enabled
5.3.3.1.1 Ensure password failed attempts lockout is configured
5.3.3.2.1 Ensure password number of changed characters is configured
5.3.3.2.2 Ensure password length is configured
5.3.3.2.3 Ensure password complexity is configured
5.3.3.2.4 Ensure password same consecutive characters is configured
5.3.3.2.5 Ensure password maximum sequential characters is configured
5.3.3.2.6 Ensure password dictionary check is enabled
5.3.3.3.3 Ensure pam_pwhistory includes use_authtok
5.3.3.4.1 Ensure pam_unix does not include nullok
5.3.3.4.2 Ensure pam_unix does not include remember
5.3.3.4.3 Ensure pam_unix includes a strong password hashing algorithm
5.3.3.4.4 Ensure pam_unix includes use_authtok
5.4.1.4 Ensure strong password hashing algorithm is configured
5.4.2.5 Ensure root path integrity
5.4.2.6 Ensure root user umask is configured
5.4.3.2 Ensure default user shell timeout is configured
5.4.3.3 Ensure default user umask is configured
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
6.2.1.3 Ensure journald log file rotation is configured
6.2.2.1.1 Ensure systemd-journal-remote is installed
6.2.2.1.2 Ensure systemd-journal-upload authentication is configured
6.2.2.1.3 Ensure systemd-journal-upload is enabled and active
6.2.2.1.4 Ensure systemd-journal-remote service is not in use
6.2.2.2 Ensure journald ForwardToSyslog is disabled
6.2.2.3 Ensure journald Compress is configured
6.2.2.4 Ensure journald Storage is configured
6.2.3.3 Ensure journald is configured to send logs to rsyslog
6.2.3.4 Ensure rsyslog log file creation mode is configured
6.2.3.7 Ensure rsyslog is not configured to receive logs from a remote client
6.2.3.8 Ensure rsyslog logrotate is configured
6.2.4.1 Ensure access to all logfiles has been configured
7.2.1 Ensure accounts in /etc/passwd use shadowed passwords
7.2.3 Ensure all groups in /etc/passwd exist in /etc/group
7.2.6 Ensure no duplicate user names exist
7.2.7 Ensure no duplicate group names exist
7.2.9 Ensure local interactive user dot files access is configured
Miscellaneous
Variables updated.