Revision 1.25Sep 19, 2023
Functional Update
- 3.1.2 Ensure wireless interfaces are disabled
- 4.1.4.3 Ensure only authorized groups are assigned ownership of audit log files
- 4.1.4.5 Ensure audit configuration files are 640 or more restrictive
- 4.1.4.6 Ensure audit configuration files are owned by root
- 4.1.4.7 Ensure audit configuration files belong to group root
- 4.2.2.1 Ensure rsyslog is installed
- 4.2.2.2 Ensure rsyslog service is enabled
- 4.2.2.3 Ensure journald is configured to send logs to rsyslog
- 4.2.2.4 Ensure rsyslog default file permissions are configured
- 4.2.2.5 Ensure logging is configured
- 4.2.2.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
- 4.2.2.6 Ensure rsyslog is configured to send logs to a remote log host
- 4.2.2.7 Ensure rsyslog is not configured to receive logs from a remote client
- 4.2.3 Ensure all logfiles have appropriate permissions and ownership
- 6.1.10 Ensure no unowned files or directories exist
- 6.1.11 Ensure no ungrouped files or directories exist
- 6.1.12 Audit SUID executables
- 6.1.13 Audit SGID executables
- 6.1.9 Ensure no world writable files exist
Miscellaneous
- Metadata updated.
- References updated.
- Variables updated.