Item Search

NameAudit NamePluginCategory
1.1.1.7 Ensure squashfs kernel module is not availableCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.8 Ensure usb-storage kernel module is not availableCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.6 Ensure separate partition exists for /varCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.1.11 Ensure separate partition exists for /var/logCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

1.7.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

MEDIA PROTECTION

2.2.3 Ensure Avahi Server is not installed - avahiCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

3.2.3 Ensure rds kernel module is not availableCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

4.1.1.4 Ensure auditing for processes that start prior to auditd is enabledCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - rules.d /etc/localtimeCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadowCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/groupCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/gshadowCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/security/opasswdCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/shadowCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/CIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/CIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure login and logout events are collected - rules.d /var/run/faillock/CIS Red Hat 6 Workstation L2 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.8 Ensure session initiation information is collected - auditctl /var/run/utmpCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure discretionary access control permission modification events are collected - auditctl chmod 64-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - auditctl setxattr 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chmod 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chown 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chown 32-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d setxattr 32-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES 32-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/CIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.15 Ensure system administrator command executions (sudo) are collected - rules.d 64-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.3.4 Ensure users must provide password for escalationCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.2.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.7 Ensure unsuccessful file access attempts are collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.13 Ensure file deletion events by users are collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recordedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.4.3 Ensure only authorized users own audit log filesCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Red Hat 6 Workstation L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.4.1.2 Ensure minimum password days is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

6.2.1.4 Ensure audit_backlog_limit is sufficientCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.2.1 Ensure audit log storage size is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.2.4 Ensure system warns when audit logs are low on spaceCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.3 Ensure events that modify the sudo log file are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.17 Ensure successful and unsuccessful attempts to use the chacl command are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.5 Ensure audit configuration files mode is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.10 Ensure audit tools group owner is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION