1.1.1.7 Ensure udf kernel module is not available | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1.2.3.1 Ensure separate partition exists for /home | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.1 Ensure separate partition exists for /home | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.1 Ensure separate partition exists for /var/log | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
1.2.1.3 Ensure repo_gpgcheck is globally activated | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
2.2.1 Ensure autofs services are not in use | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | MEDIA PROTECTION |
2.2.20 Ensure X window server services are not in use | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - CAFile | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.1 Ensure dccp kernel module is not available | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.2 Ensure tipc kernel module is not available | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.3 Ensure rds kernel module is not available | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.3 Ensure rds kernel module is not available | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
3.2.4 Ensure sctp kernel module is not available | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.4 Ensure Federal Information Processing Standard (FIPS) is enabled | CIS MongoDB 4 L2 OS Windows v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.4.3.1.3 Ensure password failed attempts lockout includes root account | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
4.4.3.1.3 Ensure password failed attempts lockout includes root account | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
4.5 Ensure Encryption of Data at Rest - encryptionKeyFile | CIS MongoDB 4 L2 OS Linux v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.1.2 Ensure auditing for processes that start prior to auditd is enabled | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.3 Ensure audit_backlog_limit is sufficient | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.3 Ensure audit_backlog_limit is sufficient | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.3 Ensure system is disabled when audit logs are full | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.4 Ensure system warns when audit logs are low on space | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.2.4 Ensure system warns when audit logs are low on space | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.6 Ensure use of privileged commands are collected | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.7 Ensure unsuccessful file access attempts are collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.10 Ensure successful file system mounts are collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.11 Ensure session initiation information is collected | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.15 Ensure successful and unsuccessful attempts to use the chcon command are recorded | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.3.18 Ensure successful and unsuccessful attempts to use the usermod command are recorded | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.4.1 Ensure the audit log directory is 0750 or more restrictive | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.3 Ensure only authorized users own audit log files | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.4 Ensure only authorized groups are assigned ownership of audit log files | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.4.5 Ensure audit configuration files are 640 or more restrictive | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.3 Ensure that logging captures as much information as possible | CIS MongoDB 4 L2 OS Windows v1.0.0 | Windows | AUDIT AND ACCOUNTABILITY |
5.3.2 Remove mail related ESPs - sybmail.dll | CIS Sybase 15.0 L2 OS Windows v1.1.0 | Windows | CONFIGURATION MANAGEMENT |
5.4 Ensure that new entries are appended to the end of the log file | CIS MongoDB 5 L2 OS Windows v1.2.0 | Windows | AUDIT AND ACCOUNTABILITY |
6.3.1.1 Ensure auditd packages are installed | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
6.3.1.4 Ensure auditd service is enabled and active | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
6.3.2.1 Ensure audit log storage size is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.2.3 Ensure system is disabled when audit logs are full | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.1 Ensure changes to system administration scope (sudoers) is collected | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.7 Ensure unsuccessful file access attempts are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.10 Ensure successful file system mounts are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collected | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
6.3.4.1 Ensure the audit log file directory mode is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.3.4.2 Ensure audit log files mode is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.3.4.6 Ensure audit configuration files owner is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.3.4.8 Ensure audit tools mode is configured | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.12 Update the Java Runtime Environment (JRE) regularly if Java is in use | CIS Sybase 15.0 L2 OS Windows v1.1.0 | Windows | |