Item Search

NameAudit NamePluginCategory
1.1.13 Add nosuid Option to Removable Media PartitionsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.1 Set User/Group Owner on /etc/grub.confCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

1.5.3 Set Boot Loader PasswordCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.5.5 Disable Interactive BootCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.6.2 Configure ExecShield - kernel.exec-shield = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.6.4 Enable XD/NX Support on 32-bit x86 Systems - kernel-PAECIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.1.9 Remove talkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.14 Disable daytime-dgramCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.15 Disable daytime-streamCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.2 Service Only via Required Protocol - use-ipv4=no'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.3 Remove X Windows - /etc/inittab- id:3:initdefault:CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.3 Remove X Windows - X Window SystemCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - nfslockCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.9 Remove DNS ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.13 Remove SambaCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.4 Log Suspicious Packets - net.ipv4.conf.all.log_martians = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.5 Enable Ignore Broadcast Requests - net.ipv4.icmp_echo_ignore_broadcasts = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.8 Enable TCP SYN Cookies - net.ipv4.tcp_syncookies = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.4.1.2 Disable IPv6 Redirect Acceptance - net.ipv6.conf.default.accept_redirect = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.5.5 Verify Permissions on /etc/hosts.denyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6.2 Disable SCTPCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/unused.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.2.3 Configure /etc/rsyslog.conf - lpr,news,uucp,local0,local1,local2,local3,local4,local5,local6 /var/log/unused.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/unused.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.4 Configure logrotate - '/var/log/boot.log'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.4 Configure logrotate - '/var/log/messages'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.4 Configure logrotate - '/var/log/spooler'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

6.1.2 Enable cron DaemonCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.1.5 Set User/Group Owner and Permission on /etc/cron.hourlyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.15 Enable SSH UsePrivilegeSeparation - UsePrivilegeSeparation yesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

RHEL-09-652010 - RHEL 9 must have the rsyslog package installed.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-652060 - RHEL 9 must use cron logging.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-09-653030 - RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-653050 - RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-653060 - RHEL 9 must label all offloaded audit logs before sending them to the central log server.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-653070 - RHEL 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-653085 - RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-653090 - RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-653130 - RHEL 9 audispd-plugins package must be installed.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-654015 - RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654055 - RHEL 9 must audit all uses of the setfiles command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654070 - RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654080 - RHEL 9 must audit all uses of the init_module and finit_module system calls.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654100 - RHEL 9 must audit all uses of the gpasswd command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654110 - RHEL 9 must audit all uses of the newgrp command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654130 - RHEL 9 must audit all uses of the postqueue command.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654190 - Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-654195 - Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-654240 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654255 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE