| Audit SGID executables | AUDIT AND ACCOUNTABILITY |
| Audit SUID executables | AUDIT AND ACCOUNTABILITY |
| Audit system file permissions - dpkg | SYSTEM AND INFORMATION INTEGRITY |
| Audit system file permissions - rpm | SYSTEM AND INFORMATION INTEGRITY |
| Audit system file permissions - zypper | SYSTEM AND INFORMATION INTEGRITY |
| chrony is not installed - NTP server | AUDIT AND ACCOUNTABILITY |
| chrony is not installed - User | AUDIT AND ACCOUNTABILITY |
| Disable Automounting | CONFIGURATION MANAGEMENT |
| Ensure /etc/hosts.allow is configured | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure /etc/hosts.deny is configured | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure access to the su command is restricted - pam_wheel.so | ACCESS CONTROL |
| Ensure access to the su command is restricted - wheel group contains root | ACCESS CONTROL |
| Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND INFORMATION INTEGRITY |
| Ensure address space layout randomization (ASLR) is enabled - sysctl.conf | SYSTEM AND INFORMATION INTEGRITY |
| Ensure AIDE is installed - dpkg | CONFIGURATION MANAGEMENT |
| Ensure AIDE is installed - rpm | AUDIT AND ACCOUNTABILITY |
| Ensure AIDE is installed - zypper | AUDIT AND ACCOUNTABILITY |
| Ensure all groups in /etc/passwd exist in /etc/group | ACCESS CONTROL |
| Ensure all users last password change date is in the past | IDENTIFICATION AND AUTHENTICATION |
| Ensure all users' home directories exist | CONFIGURATION MANAGEMENT |
| Ensure at/cron is restricted to authorized users - at.allow | ACCESS CONTROL |
| Ensure at/cron is restricted to authorized users - at.deny | ACCESS CONTROL |
| Ensure at/cron is restricted to authorized users - cron.allow | ACCESS CONTROL |
| Ensure at/cron is restricted to authorized users - cron.deny | ACCESS CONTROL |
| Ensure audit log storage size is configured | AUDIT AND ACCOUNTABILITY |
| Ensure audit logs are not automatically deleted | AUDIT AND ACCOUNTABILITY |
| Ensure authentication required for single user mode | ACCESS CONTROL |
| Ensure Avahi Server is not enabled | CONFIGURATION MANAGEMENT |
| Ensure bogus ICMP responses are ignored - /etc/sysctl | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure bogus ICMP responses are ignored - sysctl | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure broadcast ICMP requests are ignored - /etc/sysctl | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure broadcast ICMP requests are ignored - sysctl | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers | AUDIT AND ACCOUNTABILITY |
| Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.d | AUDIT AND ACCOUNTABILITY |
| Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers | AUDIT AND ACCOUNTABILITY |
| Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d | AUDIT AND ACCOUNTABILITY |
| Ensure chrony is configured - NTP server | AUDIT AND ACCOUNTABILITY |
| Ensure chrony is configured - User | AUDIT AND ACCOUNTABILITY |
| Ensure core dumps are restricted - limits.conf | ACCESS CONTROL |
| Ensure core dumps are restricted - sysctl | ACCESS CONTROL |
| Ensure core dumps are restricted - sysctl.conf | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| Ensure CUPS Server is not enabled | CONFIGURATION MANAGEMENT |
| Ensure daytime services are not enabled | CONFIGURATION MANAGEMENT |
| Ensure DCCP is disabled | CONFIGURATION MANAGEMENT |
| Ensure default deny firewall policy - Chain FORWARD | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure default deny firewall policy - Chain INPUT | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure default deny firewall policy - Chain OUTPUT | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure default group for the root account is GID 0 | ACCESS CONTROL |
| Ensure default user shell timeout is 900 seconds or less - /etc/profile | ACCESS CONTROL |
| Ensure DHCP Server is not enabled | CONFIGURATION MANAGEMENT |