Revision 1.5

Jun 9, 2020
Functional Update
  • 1.1.11 Ensure separate partition exists for /var/log
  • 1.1.12 Ensure separate partition exists for /var/log/audit
  • 1.1.13 Ensure separate partition exists for /home
  • 1.1.2 Ensure separate partition exists for /tmp
  • 1.1.6 Ensure separate partition exists for /var
  • 1.1.7 Ensure separate partition exists for /var/tmp
  • 1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0
  • 1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0
  • 1.6.1.2 Ensure the SELinux state is enforcing
  • 1.6.1.3 Ensure SELinux policy is configured
  • 1.6.1.4 Ensure SETroubleshoot is not installed
  • 1.6.1.5 Ensure the MCS Translation Service (mcstrans) is not installed
  • 1.6.1.6 Ensure no unconfined daemons exist
  • 1.6.2.1 Ensure AppArmor is not disabled in bootloader configuration
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - processes unconfined
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded
  • 1.6.3 Ensure SELinux or AppArmor are installed
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat (64-bit)
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown (64-bit)
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl setxattr/lsetxattr/fsetxattr/removexattr
  • 4.1.10 Ensure discretionary access control permission modification events are collected - auditctl xattr (64-bit)
  • 4.1.11 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES
  • 4.1.11 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES (64-bit)
  • 4.1.11 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM
  • 4.1.11 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM (64-bit)
  • 4.1.13 Ensure successful file system mounts are collected - auditctl (32-bit)
  • 4.1.13 Ensure successful file system mounts are collected - auditctl (64-bit)
  • 4.1.14 Ensure file deletion events by users are collected - auditctl (32-bit)
  • 4.1.14 Ensure file deletion events by users are collected - auditctl (64-bit)
  • 4.1.4 Ensure events that modify date and time information are collected - auditctl adjtimex (32-bit)
  • 4.1.4 Ensure events that modify date and time information are collected - auditctl adjtimex (64-bit)
  • 4.1.4 Ensure events that modify date and time information are collected - auditctl clock_settime (32-bit)
  • 4.1.4 Ensure events that modify date and time information are collected - auditctl clock_settime (64-bit)
  • 4.1.6 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit)
  • 4.1.6 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit)
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmor.d/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmor/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/selinux/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinux/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/apparmor.d/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/apparmor/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/
  • 4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/
  • 5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/profile
Informational Update
  • 1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0
  • 1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0
  • 1.6.1.2 Ensure the SELinux state is enforcing
  • 1.6.1.3 Ensure SELinux policy is configured
  • 1.6.1.4 Ensure SETroubleshoot is not installed
  • 1.6.1.5 Ensure the MCS Translation Service (mcstrans) is not installed
  • 1.6.1.6 Ensure no unconfined daemons exist
  • 1.6.2.1 Ensure AppArmor is not disabled in bootloader configuration
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - processes unconfined
  • 1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded
  • 1.6.3 Ensure SELinux or AppArmor are installed
Added
  • 4.1.17 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module
  • 4.1.17 Ensure kernel module loading and unloading is collected - init_module/delete_module
  • 4.1.8 Ensure login and logout events are collected - /var/log/faillog
  • 4.1.8 Ensure login and logout events are collected - auditctl /var/log/faillog
  • 5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/bash.bashrc*
Removed
  • 4.1.17 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module (32-bit)
  • 4.1.17 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module (64-bit)
  • 4.1.17 Ensure kernel module loading and unloading is collected - init_module/delete_module (64-bit)
  • 4.1.17 Ensure kernel module loading and unloading is collected - init_module/delete_module (32-bit)
  • 4.1.8 Ensure login and logout events are collected - /var/run/faillock/
  • 4.1.8 Ensure login and logout events are collected - auditctl /var/run/faillock/
  • 5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/bashrc