Item Search

NameAudit NamePluginCategory
1.1.7 Create Separate Partition for /var/logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

1.1.20 Disable Mounting of jffs2 Filesystems - install jffs2 /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.23 Disable Mounting of squashfs Filesystems - install squashfs /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.4.4 Remove SETroubleshootCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.4 Require Authentication for Single-User ModeCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.6.4 Enable XD/NX Support on 32-bit x86 Systems - cpuinfoCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.1.12 Disable chargen-dgramCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.18 Disable tcpmux-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.6 Restrict Published Information (if publishing is required) - publish-address=noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.6 Restrict Published Information (if publishing is required) - publish-binf=noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - portmapCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.16 Configure Mail Transfer Agent for Local-Only Mode - O DaemonPortOptions=Port=smtp, Addr=127.0.0.1, Name=MTACIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.1.1 Disable IP Forwarding - net.ipv4.ip_forward = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.1.2 Disable Send Packet Redirects - net.ipv4.conf.send_redirects = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.6 Enable Bad Error Message Protection - net.ipv4.icmp_ignore_bogus_error_responses = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.5.1 Install TCP WrappersCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5.3 Verify Permissions on /etc/hosts.allowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Configure /etc/syslog.conf - auth,userCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/syslogCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.2.1 Install the rsyslog packageCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.5 Configure rsyslog to Send Logs to a Remote Log Host - *.* @@loghost.example.comCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.1.1 Configure Audit Log Storage SizeCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.1.2 Disable System on Audit Log Full - action_mail_acctCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.5 Record Events That Modify Date and Time Information - arch=b64 -S adjtimexCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.6 Record Events That Modify User/Group Information - /etc/groupCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.6 Record Events That Modify User/Group Information - /etc/gshadowCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - /etc/issue.netCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.9 Collect Login and Logout Events - /var/log/lastlogCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.12 Collect Unsuccessful Unauthorized Access Attempts to Files - arch=b32 EACCESCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.12 Collect Unsuccessful Unauthorized Access Attempts to Files - arch=b64 EACCESCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.18 Collect Kernel Module Loading and Unloading - /sbin/insmodCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.1.8 Set User/Group Owner and Permission on /etc/cron.monthlyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.10 Restrict at/cron to Authorized Users - at.allowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.4 Disable SSH X11 ForwardingCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.5 Set SSH MaxAuthTries to 4 or LessCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.14 Set SSH Banner - Banner /etc/issueCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.3.3 Use pam_deny.so to Deny Services - auth requisite pam_deny.so /etc/pam.d/*CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.3 Set Default Group for root AccountCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

8.1.2 Remove OS Information from Login Warning Banners - /etc/motdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.1.2 Verify Permissions on /etc/passwdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.12 Find Un-grouped Files and DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.14 Find SGID System ExecutablesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.2 Verify No Legacy '+' Entries Exist in /etc/passwd File - + Entries Exist in /etc/passwd FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

9.2.3 Verify No Legacy '+' Entries Exist in /etc/shadow File - + Entries Exist in /etc/shadow FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

RHEL-09-654085 - RHEL 9 must audit all uses of the chage command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654090 - RHEL 9 must audit all uses of the chsh command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654140 - RHEL 9 must audit all uses of the ssh-keysign command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654150 - RHEL 9 must audit all uses of the sudo command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654175 - RHEL 9 must audit all uses of the usermod command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654235 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE