Revision 1.8

Jul 21, 2022
Functional Update
  • 1.3.2 Ensure filesystem integrity is regularly checked
  • 1.7.1 Ensure message of the day is configured properly - banner
  • 1.7.1 Ensure message of the day is configured properly - platform flags
  • 1.7.4 Ensure permissions on /etc/motd are configured
  • 2.1.1.3 Ensure chrony is configured - server
  • 2.1.1.4 Ensure ntp is configured - user
  • 3.5.2.1 Ensure nftables is installed
  • 3.5.2.10 Ensure nftables rules are permanent
  • 3.5.2.2 Ensure ufw is uninstalled or disabled with nftables
  • 3.5.2.3 Ensure iptables are flushed with nftables - v4
  • 3.5.2.3 Ensure iptables are flushed with nftables - v6
  • 3.5.2.4 Ensure a nftables table exists
  • 3.5.2.5 Ensure nftables base chains exist - forward
  • 3.5.2.5 Ensure nftables base chains exist - input
  • 3.5.2.5 Ensure nftables base chains exist - output
  • 3.5.2.6 Ensure nftables loopback traffic is configured - lo
  • 3.5.2.6 Ensure nftables loopback traffic is configured - v4
  • 3.5.2.6 Ensure nftables loopback traffic is configured - v6
  • 3.5.2.7 Ensure nftables outbound and established connections are configured
  • 3.5.2.7 Ensure outbound and established connections are configured
  • 3.5.2.8 Ensure nftables default deny firewall policy - forward
  • 3.5.2.8 Ensure nftables default deny firewall policy - input
  • 3.5.2.8 Ensure nftables default deny firewall policy - output
  • 3.5.2.9 Ensure nftables service is enabled
  • 3.5.3.1.1 Ensure iptables packages are installed - iptables
  • 3.5.3.1.1 Ensure iptables packages are installed - iptables-persistent
  • 3.5.3.1.2 Ensure nftables is not installed with iptables
  • 3.5.3.1.3 Ensure ufw is uninstalled or disabled with iptables
  • 3.5.3.2.1 Ensure iptables default deny firewall policy - 'Chain FORWARD'
  • 3.5.3.2.1 Ensure iptables default deny firewall policy - 'Chain INPUT'
  • 3.5.3.2.1 Ensure iptables default deny firewall policy - 'Chain OUTPUT'
  • 3.5.3.2.2 Ensure iptables loopback traffic is configured
  • 3.5.3.2.3 Ensure iptables outbound and established connections are configured
  • 3.5.3.2.4 Ensure iptables firewall rules exist for all open ports
  • 3.5.3.3.1 Ensure ip6tables default deny firewall policy - 'Chain FORWARD'
  • 3.5.3.3.1 Ensure ip6tables default deny firewall policy - 'Chain INPUT'
  • 3.5.3.3.1 Ensure ip6tables default deny firewall policy - 'Chain OUTPUT'
  • 3.5.3.3.2 Ensure ip6tables loopback traffic is configured
  • 3.5.3.3.3 Ensure ip6tables outbound and established connections are configured
  • 3.5.3.3.4 Ensure ip6tables firewall rules exist for all open ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - ModLoad
Miscellaneous
  • References updated.