Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure squashfs kernel module is not availableCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.8 Ensure usb-storage kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.1 Ensure separate partition exists for /var/log/auditCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

1.1.2.7.1 Ensure separate partition exists for /var/log/auditCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

1.3.1.4 Ensure all AppArmor Profiles are enforcingCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.5 Ensure the SELinux mode is enforcingCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.8.6 Ensure GDM automatic mounting of removable media is disabledCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

2.1.2 Ensure avahi daemon services are not in useCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure ldap client is not installedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.1.3 Ensure bluetooth services are not in useCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.2.3 Ensure rds kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.2.4 Ensure sctp kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

5.2.2.1 Ensure audit log storage size is configuredCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.6 Ensure use of privileged commands are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.8 Ensure events that modify user/group information are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recordedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.20 Ensure the audit configuration is immutableCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.2.3.2 Ensure actions as another user are always loggedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure use of privileged commands are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.9 Ensure discretionary access control permission modification events are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.20 Ensure the audit configuration is immutableCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.2.4.2 Ensure audit log files owner is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.9 Ensure audit tools owner is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.1.1 Ensure auditd packages are installedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.2.4 Ensure system warns when audit logs are low on spaceCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.3 Ensure events that modify the sudo log file are collectedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.5 Ensure events that modify the system's network environment are collectedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.7 Ensure unsuccessful file access attempts are collectedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.10 Ensure successful file system mounts are collectedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure file deletion events by users are collectedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collectedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.21 Ensure the running and on disk configuration is the sameCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.4.2 Ensure audit log files mode is configuredCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.3 Ensure audit log files owner is configuredCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.5 Ensure audit configuration files mode is configuredCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.6 Ensure audit configuration files owner is configuredCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.10 Ensure audit tools group owner is configuredCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.1.1 Ensure auditd packages are installedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.6 Ensure use of privileged commands are collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.9 Ensure discretionary access control permission modification events are collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recordedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.21 Ensure the running and on disk configuration is the sameCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.4.3 Ensure audit log files group owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.9 Ensure audit tools owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION