1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - hfsplus | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.2 Ensure /tmp is configured | CONFIGURATION MANAGEMENT |
1.1.3 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.4 Ensure nosuid option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.5 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.6 Ensure /dev/shm is configured | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
1.1.7 Ensure nodev option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.8 Ensure nosuid option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.9 Ensure noexec option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.12 Ensure /var/tmp partition includes the nodev option | CONFIGURATION MANAGEMENT |
1.1.13 Ensure /var/tmp partition includes the nosuid option | CONFIGURATION MANAGEMENT |
1.1.14 Ensure /var/tmp partition includes the noexec option | CONFIGURATION MANAGEMENT |
1.1.18 Ensure /home partition includes the nodev option | CONFIGURATION MANAGEMENT |
1.1.19 Ensure nodev option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.20 Ensure nosuid option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.21 Ensure noexec option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.22 Ensure sticky bit is set on all world-writable directories | CONFIGURATION MANAGEMENT |
1.2.1 Ensure package manager repositories are configured | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed - aide | AUDIT AND ACCOUNTABILITY |
1.3.1 Ensure AIDE is installed - aide-common | AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked | AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure permissions on bootloader config are not overridden - chmod | ACCESS CONTROL |
1.4.1 Ensure permissions on bootloader config are not overridden - if line | ACCESS CONTROL |
1.4.2 Ensure bootloader password is set - 'passwd_pbkdf2' | CONFIGURATION MANAGEMENT |
1.4.2 Ensure bootloader password is set - 'set superusers' | CONFIGURATION MANAGEMENT |
1.4.3 Ensure permissions on bootloader config are configured | CONFIGURATION MANAGEMENT |
1.4.4 Ensure authentication required for single user mode | CONFIGURATION MANAGEMENT |
1.5.1 Ensure XD/NX support is enabled | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure address space layout randomization (ASLR) is enabled - config | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure prelink is disabled | AUDIT AND ACCOUNTABILITY |
1.5.4 Ensure core dumps are restricted - limits config | CONFIGURATION MANAGEMENT |
1.5.4 Ensure core dumps are restricted - processsizemax | CONFIGURATION MANAGEMENT |
1.5.4 Ensure core dumps are restricted - storage | CONFIGURATION MANAGEMENT |
1.5.4 Ensure core dumps are restricted - sysctl | CONFIGURATION MANAGEMENT |
1.5.4 Ensure core dumps are restricted - sysctl config | CONFIGURATION MANAGEMENT |
1.6.1.1 Ensure AppArmor is installed | ACCESS CONTROL |
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor | ACCESS CONTROL |