CIS SUSE Linux Enterprise 15 v2.0.1 L1 Server

Audit Details

Name: CIS SUSE Linux Enterprise 15 v2.0.1 L1 Server

Updated: 12/29/2025

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 225

File Details

Filename: CIS_SUSE_Linux_Enterprise_15_v2.0.1_L1_Server.audit

Size: 1.11 MB

MD5: 158b338b281a2b2a96854e8f230a1d6f
SHA256: 66ec360f5fc5217bafd96f1b00005072e19a0613c378fed7ae76c1e734290147

Audit Changelog

 
Revision 1.1

Dec 29, 2025

Functional Update
  • 5.4.1.3 Ensure password expiration warning days is configured
Informational Update
  • 1.1.1.1 Ensure cramfs kernel module is not available
  • 1.1.1.2 Ensure freevxfs kernel module is not available
  • 1.1.1.3 Ensure hfs kernel module is not available
  • 1.1.1.4 Ensure hfsplus kernel module is not available
  • 1.1.1.5 Ensure jffs2 kernel module is not available
  • 1.1.1.9 Ensure unused filesystems kernel modules are not available
  • 1.1.2.1.1 Ensure /tmp is a separate partition
  • 1.1.2.1.2 Ensure nodev option set on /tmp partition
  • 1.1.2.1.3 Ensure nosuid option set on /tmp partition
  • 1.1.2.1.4 Ensure noexec option set on /tmp partition
  • 1.1.2.2.1 Ensure /dev/shm is a separate partition
  • 1.1.2.2.2 Ensure nodev option set on /dev/shm partition
  • 1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
  • 1.1.2.2.4 Ensure noexec option set on /dev/shm partition
  • 1.1.2.3.2 Ensure nodev option set on /home partition
  • 1.1.2.3.3 Ensure nosuid option set on /home partition
  • 1.1.2.4.2 Ensure nodev option set on /var partition
  • 1.1.2.4.3 Ensure nosuid option set on /var partition
  • 1.1.2.5.2 Ensure nodev option set on /var/tmp partition
  • 1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
  • 1.1.2.5.4 Ensure noexec option set on /var/tmp partition
  • 1.1.2.6.2 Ensure nodev option set on /var/log partition
  • 1.1.2.6.3 Ensure nosuid option set on /var/log partition
  • 1.1.2.6.4 Ensure noexec option set on /var/log partition
  • 1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
  • 1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
  • 1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
  • 1.2.1.2 Ensure gpgcheck is globally activated
  • 1.4.2 Ensure access to bootloader config is configured
  • 1.5.1 Ensure address space layout randomization is enabled
  • 1.6.1 Ensure crypto-policies-scripts package is installed
  • 1.6.2 Ensure system wide crypto policy is not set to legacy
  • 1.6.4 Ensure system wide crypto policy disables sha1 hash and signature support
  • 1.6.5 Ensure system wide crypto policy disables macs less than 128 bits
  • 1.6.6 Ensure system wide crypto policy disables cbc for ssh
  • 1.6.7 Ensure system wide crypto policy disables chacha20-poly1305 for ssh
  • 1.7.1 Ensure /etc/motd is configured
  • 1.7.2 Ensure /etc/issue is configured
  • 1.7.3 Ensure /etc/issue.net is configured
  • 2.1.12 Ensure print server services are not in use
  • 2.1.13 Ensure rpcbind services are not in use
  • 2.1.14 Ensure rsync services are not in use
  • 2.1.15 Ensure snmp services are not in use
  • 2.1.17 Ensure tftp server services are not in use
  • 2.1.19 Ensure web server services are not in use
  • 2.1.2 Ensure avahi daemon services are not in use
  • 2.1.20 Ensure xinetd services are not in use
  • 2.1.3 Ensure dhcp server services are not in use
  • 2.1.9 Ensure message access server services are not in use
  • 2.3.1.1 Ensure a single time synchronization daemon is in use
  • 2.3.2.1 Ensure systemd-timesyncd configured with authorized timeserver
  • 2.4.1.7 Ensure access to /etc/cron.d is configured
  • 2.4.1.8 Ensure access to crontab is configured
  • 2.4.2.1 Ensure access to at is configured
  • 3.1.3 Ensure bluetooth services are not in use
  • 3.3.1 Ensure ip forwarding is disabled
  • 3.3.10 Ensure tcp syn cookies is enabled
  • 3.3.11 Ensure ipv6 router advertisements are not accepted
  • 3.3.2 Ensure packet redirect sending is disabled
  • 3.3.3 Ensure bogus icmp responses are ignored
  • 3.3.4 Ensure broadcast icmp requests are ignored
  • 3.3.5 Ensure icmp redirects are not accepted
  • 3.3.6 Ensure secure icmp redirects are not accepted
  • 3.3.7 Ensure reverse path filtering is enabled
  • 3.3.8 Ensure source routed packets are not accepted
  • 3.3.9 Ensure suspicious packets are logged
  • 4.2.1 Ensure firewalld is installed
  • 4.2.5 Ensure firewalld service is enabled and running
  • 5.1.1 Ensure access to /etc/ssh/sshd_config is configured
  • 5.1.12 Ensure sshd HostbasedAuthentication is disabled
  • 5.1.13 Ensure sshd IgnoreRhosts is enabled
  • 5.1.20 Ensure sshd PermitRootLogin is disabled
  • 5.1.22 Ensure sshd UsePAM is enabled
  • 5.1.6 Ensure sshd MACs are configured
  • 5.1.7 Ensure sshd access is configured
  • 5.1.8 Ensure sshd Banner is configured
  • 5.1.9 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
  • 5.2.1 Ensure sudo is installed
  • 5.2.2 Ensure sudo commands use pty
  • 5.2.3 Ensure sudo log file exists
  • 5.2.6 Ensure sudo authentication timeout is configured correctly
  • 5.2.7 Ensure access to the su command is restricted
  • 5.3.2.1.1 Ensure password failed attempts lockout is configured
  • 5.3.2.2.1 Ensure password dictionary check is enabled
  • 5.3.2.2.2 Ensure password number of changed characters is configured
  • 5.3.2.2.3 Ensure password length is configured
  • 5.3.2.2.4 Ensure password complexity is configured
  • 5.3.2.2.5 Ensure password same consecutive characters is configured
  • 5.3.2.2.6 Ensure password maximum sequential characters is configured
  • 5.3.2.4.2 Ensure pam_unix does not include remember
  • 5.3.2.4.3 Ensure pam_unix includes a strong password hashing algorithm
  • 5.4.1.4 Ensure strong password hashing algorithm is configured
  • 5.4.2.5 Ensure root path integrity
  • 5.4.2.6 Ensure root user umask is configured
  • 5.4.3.2 Ensure default user shell timeout is configured
  • 5.4.3.3 Ensure default user umask is configured
  • 6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools
  • 6.2.1.3 Ensure journald log file rotation is configured
  • 6.2.2.1.1 Ensure systemd-journal-remote is installed
  • 6.2.2.1.2 Ensure systemd-journal-upload authentication is configured
  • 6.2.2.1.3 Ensure systemd-journal-upload is enabled and active
  • 6.2.2.1.4 Ensure systemd-journal-remote service is not in use
  • 6.2.2.2 Ensure journald ForwardToSyslog is disabled
  • 6.2.2.3 Ensure journald Compress is configured
  • 6.2.2.4 Ensure journald Storage is configured
  • 6.2.3.1.2 Ensure rsyslog is not configured to receive logs from a remote client
  • 6.2.3.4 Ensure journald is configured to send logs to rsyslog
  • 6.2.3.5 Ensure rsyslog log file creation mode is configured
  • 6.2.3.7 Ensure rsyslog logrotate is configured
  • 6.2.4.1 Ensure access to all logfiles has been configured
  • 7.2.1 Ensure accounts in /etc/passwd use shadowed passwords
  • 7.2.3 Ensure all groups in /etc/passwd exist in /etc/group
  • 7.2.6 Ensure no duplicate user names exist
  • 7.2.7 Ensure no duplicate group names exist
  • 7.2.9 Ensure local interactive user dot files access is configured
Miscellaneous
  • Metadata updated.
  • Platform check updated.
  • References updated.
  • Variables updated.
Added
  • CIS_SUSE_Linux_Enterprise_15_v2.0.1_L1_Server.audit from CIS SUSE Linux Enterprise 15 v2.0.1
Removed
  • CIS_SUSE_Linux_Enterprise_15_v2.0.1_L1_Server.audit from CIS SUSE Linux Enterprise 15 Benchmark v2.0.1