Item Search

NameAudit NamePluginCategory
1.1.2 Ensure /tmp is configuredCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 Ensure separate partition exists for /var/logCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

1.1.23 Disable USB Storage - modprobeCIS Red Hat 6 Workstation L2 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.5 Ensure the SELinux mode is enforcing - configCIS Red Hat 6 Workstation L2 v3.0.0Unix

ACCESS CONTROL

1.8.6 Ensure GDM automatic mounting of removable media is disabledCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.8.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

3.1.2 Ensure SCTP is disabledCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure tipc kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.2.3 Ensure rds kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

4.1.1.1 Ensure auditd is installed - audit-libsCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.1.3 Ensure auditd service is enabledCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure audit log storage size is configuredCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.2.4 Ensure audit_backlog_limit is sufficientCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3 Ensure events that modify date and time information are collected - auditctl adjtimex settimeofday64-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.3 Ensure events that modify date and time information are collected - rules.d adjtimex settimeofday 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.3.2 Ensure actions as another user are always loggedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.4 Ensure events that modify date and time information are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.8 Ensure events that modify user/group information are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recordedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadowCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/security/opasswdCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/hostsCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issueCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issue.netCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - auditctl setxattr 64-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chmod 64-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.9 Ensure discretionary access control permission modification events are collected - rules.d setxattr 64-bitCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - rules.d EACCES 64-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.12 Ensure successful file system mounts are collected - auditctl 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.12 Ensure successful file system mounts are collected - auditctl 64-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.13 Ensure file deletion events by users are collected - auditctl 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/CIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl 64-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.15 Ensure system administrator command executions (sudo) are collected - rules.d 32-bitCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.3.4 Ensure users must provide password for escalationCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.1.1 Audit system file permissionsCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.3.1.3 Ensure audit_backlog_limit is sufficientCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.2.1 Ensure audit log storage size is configuredCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.2.3 Ensure system is disabled when audit logs are fullCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.6 Ensure use of privileged commands are collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.11 Ensure session initiation information is collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.12 Ensure login and logout events are collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure file deletion events by users are collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.19 Ensure kernel module loading unloading and modification is collectedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY