Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure squashfs kernel module is not availableCIS Red Hat EL8 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure udf kernel module is not availableCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure udf kernel module is not availableCIS Red Hat EL8 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure udf kernel module is not availableCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.1.2.3.1 Ensure separate partition exists for /homeCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.1 Ensure separate partition exists for /var/logCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

1.1.2.7.1 Ensure separate partition exists for /var/log/auditCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

1.5.1.5 Ensure the SELinux mode is enforcingCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.5 Ensure the SELinux mode is enforcingCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.7.6 Ensure GDM automatic mounting of removable media is disabledCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.8.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS Red Hat EL8 Workstation L2 v3.0.0Unix

MEDIA PROTECTION

2.2.1 Ensure autofs services are not in useCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

MEDIA PROTECTION

2.3.2 Ensure ldap client is not installedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.2.2 Ensure tipc kernel module is not availableCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.2.3 Ensure rds kernel module is not availableCIS Red Hat EL8 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.2.4 Ensure sctp kernel module is not availableCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

4.1.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.9 Ensure discretionary access control permission modification events are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.3.12 Ensure login and logout events are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.1.1 Ensure audit is installedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.2.1 Ensure audit log storage size is configuredCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.2.2 Ensure audit logs are not automatically deletedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.4 Ensure events that modify date and time information are collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.5 Ensure events that modify the system's network environment are collectedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.6 Ensure use of privileged commands are collectedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.9 Ensure discretionary access control permission modification events are collectedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.10 Ensure successful file system mounts are collectedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recordedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recordedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.19 Ensure kernel module loading unloading and modification is collectedCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.20 Ensure the audit configuration is immutableCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.3.21 Ensure the running and on disk configuration is the sameCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure only authorized groups are assigned ownership of audit log filesCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.4.2.1 Ensure audit log storage size is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.2.3 Ensure system is disabled when audit logs are fullCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.4 Ensure events that modify date and time information are collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.5 Ensure events that modify the system's network environment are collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.19 Ensure kernel module loading unloading and modification is collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.4.1 Ensure audit log files mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.2 Ensure audit log files owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.6 Ensure audit configuration files owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.10 Ensure audit tools group owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION