1.1.1.6 Ensure squashfs kernel module is not available | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1.1.8 Ensure usb-storage kernel module is not available | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | MEDIA PROTECTION |
1.1.2.4.1 Ensure separate partition exists for /var | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.1 Ensure separate partition exists for /var/tmp | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.1 Ensure separate partition exists for /var/log | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
1.2.3 Ensure repo_gpgcheck is globally activated | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure repo_gpgcheck is globally activated | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.5.1.5 Ensure the SELinux mode is enforcing | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.2.1 Ensure autofs services are not in use | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | MEDIA PROTECTION |
2.2.1 Ensure autofs services are not in use | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | MEDIA PROTECTION |
2.3.2 Ensure ldap client is not installed | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3.2 Ensure ldap client is not installed | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.1.3 Ensure bluetooth services are not in use | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.1 Ensure dccp kernel module is not available | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.2 Ensure tipc kernel module is not available | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.3 Ensure rds kernel module is not available | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.4 Ensure sctp kernel module is not available | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.4.3.1.3 Ensure password failed attempts lockout includes root account | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
4.5.3.1 Ensure nologin is not listed in /etc/shells | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.3.1 Ensure nologin is not listed in /etc/shells | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.1.2 Ensure auditing for processes that start prior to auditd is enabled | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.2 Ensure auditing for processes that start prior to auditd is enabled | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.2 Ensure auditing for processes that start prior to auditd is enabled | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.3 Ensure audit_backlog_limit is sufficient | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.3 Ensure audit_backlog_limit is sufficient | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.4 Ensure auditd service is enabled | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.1 Ensure audit log storage size is configured | CIS Rocky Linux 8 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.4 Ensure system warns when audit logs are low on space | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.4 Ensure system warns when audit logs are low on space | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.3 Ensure events that modify the sudo log file are collected | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.5 Ensure events that modify the system's network environment are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.7 Ensure unsuccessful file access attempts are collected | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.8 Ensure events that modify user/group information are collected | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.9 Ensure discretionary access control permission modification events are collected | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.12 Ensure login and logout events are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.12 Ensure login and logout events are collected | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collected | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recorded | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recorded | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recorded | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.19 Ensure kernel module loading unloading and modification is collected | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.21 Ensure the running and on disk configuration is the same | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.21 Ensure the running and on disk configuration is the same | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.4.1 Ensure the audit log directory is 0750 or more restrictive | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.1 Ensure the audit log directory is 0750 or more restrictive | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.5 Ensure audit configuration files are 640 or more restrictive | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.6 Ensure audit configuration files are owned by root | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.7 Ensure audit configuration files belong to group root | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.10 Ensure audit tools belong to group root | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit system file permissions | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |