Revision 1.25

Sep 19, 2023
Functional Update
  • 3.1.2 Ensure wireless interfaces are disabled
  • 4.1.4.3 Ensure only authorized groups are assigned ownership of audit log files
  • 4.1.4.5 Ensure audit configuration files are 640 or more restrictive
  • 4.1.4.6 Ensure audit configuration files are owned by root
  • 4.1.4.7 Ensure audit configuration files belong to group root
  • 4.2.2.1 Ensure rsyslog is installed
  • 4.2.2.2 Ensure rsyslog service is enabled
  • 4.2.2.3 Ensure journald is configured to send logs to rsyslog
  • 4.2.2.4 Ensure rsyslog default file permissions are configured
  • 4.2.2.5 Ensure logging is configured
  • 4.2.2.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.2.6 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.2.7 Ensure rsyslog is not configured to receive logs from a remote client
  • 4.2.3 Ensure all logfiles have appropriate permissions and ownership
  • 6.1.10 Ensure no unowned files or directories exist
  • 6.1.11 Ensure no ungrouped files or directories exist
  • 6.1.12 Audit SUID executables
  • 6.1.13 Audit SGID executables
  • 6.1.9 Ensure no world writable files exist
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.