CIS SUSE Linux Enterprise 15 Server L2 v1.1.1

Audit Details

Name: CIS SUSE Linux Enterprise 15 Server L2 v1.1.1

Updated: 4/25/2022

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 130

File Details

Filename: CIS_SUSE_Linux_Enterprise_15_Server_v1.1.1_L2.audit

Size: 450 kB

MD5: 4989bff1aa65636955140070545bb1d9
SHA256: 4ce77dc46c246240704fd292a1b13f59f6ff4580b989b92ecef73910de8afe4b

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of squashfs filesystems is disabled

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - EFI

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - lsmod fat

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - lsmod msdos

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - lsmod vfat

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - modprobe fat

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - modprobe msdos

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.1.3 Ensure mounting of FAT filesystems is limited - modprobe vfat

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.10 Ensure separate partition exists for /var

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.11 Ensure separate partition exists for /var/tmp

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.15 Ensure separate partition exists for /var/log

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.16 Ensure separate partition exists for /var/log/audit

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.1.17 Ensure separate partition exists for /home

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles enforce mode

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.4 Ensure all AppArmor Profiles are enforcing - unconfined

ACCESS CONTROL, MEDIA PROTECTION

3.1.1 Disable IPv6 - grub.cfg

CONFIGURATION MANAGEMENT

3.1.1 Disable IPv6 - sysctl all disable_ipv6

CONFIGURATION MANAGEMENT

3.1.1 Disable IPv6 - sysctl default disable_ipv6

CONFIGURATION MANAGEMENT

3.1.1 Disable IPv6 - sysctl.conf all disable_ipv6

CONFIGURATION MANAGEMENT

3.1.1 Disable IPv6 - sysctl.conf default disable_ipv6

CONFIGURATION MANAGEMENT

3.4.1 Ensure DCCP is disabled - lsmod

CONFIGURATION MANAGEMENT

3.4.1 Ensure DCCP is disabled - modprobe

CONFIGURATION MANAGEMENT

3.4.2 Ensure SCTP is disabled - lsmod

CONFIGURATION MANAGEMENT

3.4.2 Ensure SCTP is disabled - modprobe

CONFIGURATION MANAGEMENT

4.1.1.1 Ensure auditd is installed

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.1.2 Ensure auditd service is enabled and running - enabled

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.1.2 Ensure auditd service is enabled and running - running

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.2.1 Ensure audit log storage size is configured

AUDIT AND ACCOUNTABILITY

4.1.2.2 Ensure audit logs are not automatically deleted

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure system is disabled when audit logs are full - action_mail_acct

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.2.3 Ensure system is disabled when audit logs are full - admin_space_left_action

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.2.4 Ensure audit_backlog_limit is sufficient

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.3 Ensure events that modify date and time information are collected - auditctl b32 /etc/localtime

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - auditctl b32 adjtimex

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - auditctl b32 clock_settime

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - auditctl b64 adjtimex

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - auditctl b64 clock_settime

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - b32 /etc/localtime

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - b32 adjtimex

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - b32 clock_settime

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - b64 adjtimex

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - b64 clock_settime

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/group

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/passwd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/security/opasswd

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - /etc/shadow

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/group

AUDIT AND ACCOUNTABILITY