CIS SUSE Linux Enterprise Workstation 12 L1 v3.1.0

Audit Details

Name: CIS SUSE Linux Enterprise Workstation 12 L1 v3.1.0

Updated: 1/9/2024

Authority: CIS

Plugin: Unix

Revision: 1.20

Estimated Item Count: 269

File Details

Filename: CIS_SUSE_Linux_Enterprise_Workstation_12_v3.1.0_L1.audit

Size: 818 kB

MD5: 712a72a589aa7963de5c34bb6d35589d
SHA256: 68fba12ad75e8af41259a0e3d516bff6791fb77b21be509b54186d183532ebfc

Audit Changelog

 
Revision 1.20

Jan 9, 2024

Functional Update
  • 5.4.1.3 Ensure minimum days between password changes is configured - users
Revision 1.19

Jan 7, 2024

Functional Update
  • 5.3.1 Ensure password creation requirements are configured - dcredit
  • 5.3.1 Ensure password creation requirements are configured - lcredit
  • 5.3.1 Ensure password creation requirements are configured - minlen
  • 5.3.1 Ensure password creation requirements are configured - ocredit
  • 5.3.1 Ensure password creation requirements are configured - ucredit
  • 5.3.3 Ensure password reuse is limited
Miscellaneous
  • Metadata updated.
  • Variables updated.
Revision 1.18

Dec 20, 2023

Miscellaneous
  • Metadata updated.
Revision 1.17

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.16

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.15

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 3.2.1 Ensure IP forwarding is disabled - sysctl ipv6
  • 3.2.1 Ensure IP forwarding is disabled - sysctl ipv6 conf files
  • 3.3.1 Ensure source routed packets are not accepted - sysctl conf ipv6 all
  • 3.3.1 Ensure source routed packets are not accepted - sysctl conf ipv6 default
  • 3.3.1 Ensure source routed packets are not accepted - sysctl ipv6 all
  • 3.3.1 Ensure source routed packets are not accepted - sysctl ipv6 default
  • 3.3.2 Ensure ICMP redirects are not accepted - sysctl ipv6 all
  • 3.3.2 Ensure ICMP redirects are not accepted - sysctl ipv6 default
  • 3.3.2 Ensure ICMP redirects are not accepted - sysctl.conf ipv6 all
  • 3.3.2 Ensure ICMP redirects are not accepted - sysctl.conf ipv6 default
  • 3.3.9 Ensure IPv6 router advertisements are not accepted - sysctl ipv6 all
  • 3.3.9 Ensure IPv6 router advertisements are not accepted - sysctl ipv6 default
  • 3.3.9 Ensure IPv6 router advertisements are not accepted - sysctl.conf ipv6 all
  • 3.3.9 Ensure IPv6 router advertisements are not accepted - sysctl.conf ipv6 default
  • 3.5.3.1 Ensure IPv6 loopback traffic is configured - input
  • 3.5.3.1 Ensure IPv6 loopback traffic is configured - output
  • 3.5.3.2 Ensure IPv6 outbound and established connections are configured
  • 3.5.3.3 Ensure IPv6 firewall rules exist for all open ports
  • 3.5.3.4 Ensure IPv6 default deny firewall policy
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 5.2.2 Ensure permissions on SSH private host key files are configured
  • 6.1.10 Ensure no ungrouped files or directories exist
  • 6.1.11 Audit SUID executables
  • 6.1.12 Audit SGID executables
  • 6.1.8 Ensure no world writable files exist
  • 6.1.9 Ensure no unowned files or directories exist
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.14

Aug 8, 2023

Functional Update
  • 2.2.15 Ensure net-snmp is not installed
Revision 1.13

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
Miscellaneous
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - running
  • 4.2.1.3 Ensure rsyslog default file permissions configured - rsyslog.conf/rsyslog.d
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host - rsyslog.conf/rsyslogd.
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - ModLoad
Revision 1.12

Jul 20, 2023

Functional Update
  • 5.4.1.2 Ensure password expiration is 365 days or less - users
  • 5.4.1.5 Ensure inactive password lock is 30 days or less - users
  • 6.1.11 Audit SUID executables
  • 6.1.12 Audit SGID executables
  • 6.2.4 Ensure root PATH Integrity
  • 6.2.5 Ensure all users' home directories exist
  • 6.2.6 Ensure users' home directories permissions are 750 or more restrictive
  • 6.2.7 Ensure users own their home directories
Revision 1.11

May 24, 2023

Functional Update
  • 1.1.2 Ensure /tmp is configured - config check