1.1.1.8 Ensure usb-storage kernel module is not available | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | MEDIA PROTECTION |
1.1.2.4.1 Ensure separate partition exists for /var | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.1 Ensure separate partition exists for /var/tmp | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.1 Ensure separate partition exists for /var/log/audit | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
1.1.20 Disable Mounting of jffs2 Filesystems - install jffs2 /bin/true' | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | CONFIGURATION MANAGEMENT |
1.1.24 Disable Mounting of udf Filesystems - modprobe | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | CONFIGURATION MANAGEMENT |
1.2.3 Ensure repo_gpgcheck is globally activated | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1.5 Ensure the SELinux mode is enforcing | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1.5 Ensure the SELinux mode is enforcing | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.1.20 Ensure X window server services are not in use | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure avahi daemon services are not in use | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanisms | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CIS MongoDB 5 L2 OS Windows v1.2.0 | Windows | CONFIGURATION MANAGEMENT |
2.08 Listener password - 'Use OS Authentication' | CIS v1.1.0 Oracle 11g OS L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
3.2.2 Ensure tipc kernel module is not available | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.3.4 Ensure users must provide password for escalation | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
4.3.4 Ensure users must provide password for escalation | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
4.5 Ensure Encryption of Data at Rest - encryptionKeyFile | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
4.5.3.1 Ensure nologin is not listed in /etc/shells | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2 Ensure that audit filters are configured properly | CIS MongoDB 4 L2 OS Linux v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.4 Ensure auditd service is enabled | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.3 Ensure system is disabled when audit logs are full | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.2 Ensure actions as another user are always logged | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.3 Ensure events that modify the sudo log file are collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.5 Ensure events that modify the system's network environment are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.6 Ensure use of privileged commands are collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.9 Ensure discretionary access control permission modification events are collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.10 Ensure successful file system mounts are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.12 Ensure login and logout events are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recorded | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recorded | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.19 Ensure kernel module loading unloading and modification is collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.20 Ensure the audit configuration is immutable | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.2.3.21 Ensure the running and on disk configuration is the same | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.4 Ensure users must provide password for escalation | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.2.4.1 Ensure the audit log directory is 0750 or more restrictive | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.2 Ensure audit log files are mode 0640 or less permissive | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.8 Ensure audit tools are 755 or more restrictive | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4 Ensure that new entries are appended to the end of the log file | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | AUDIT AND ACCOUNTABILITY |
6.2 Ensure that operating system resource limits are set for MongoDB | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.2 Ensure that operating system resource limits are set for MongoDB | CIS MongoDB 5 L2 OS Windows v1.2.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Ensure that server-side scripting is disabled if not needed | CIS MongoDB 4 L2 OS Linux v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.3.2.4 Ensure system warns when audit logs are low on space | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.3 Ensure events that modify the sudo log file are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.6 Ensure use of privileged commands are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.4.1 Ensure the audit log file directory mode is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.3.4.8 Ensure audit tools mode is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
ALMA-09-036430 - AlmaLinux OS 9 passwords for new users must have a minimum of 15 characters. | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |