Item Search

NameAudit NamePluginCategory
1.1.1.1 Ensure cramfs kernel module is not availableCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.1 Ensure cramfs kernel module is not availableCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.2.1.1 Ensure /tmp is a separate partitionCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.2.2 Ensure nodev option set on /dev/shm partitionCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.4 Ensure noexec option set on /dev/shm partitionCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.4 Ensure access to /etc/motd is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.2 Ensure GDM login banner is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.4 Ensure GDM screen locks when the user is idleCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.9 Ensure GDM autorun-never is not overriddenCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

MEDIA PROTECTION

2.1.1 Ensure time synchronization is in useCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

2.1.2 Ensure chrony is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

2.2.3 Ensure dhcp server services are not in useCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.16 Ensure tftp server services are not in useCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.2 Ensure packet redirect sending is disabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.4.2.2 Ensure firewalld service enabled and runningCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.7 Ensure nftables default deny firewall policyCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.1 Ensure at is restricted to authorized usersCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.6 Ensure sshd Ciphers are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.7 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.2.11 Ensure sshd IgnoreRhosts is enabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

4.2.17 Ensure sshd MaxSessions is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.2.19 Ensure sshd PermitEmptyPasswords is disabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

4.2.21 Ensure sshd PermitUserEnvironment is disabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

4.4.2.1.2 Ensure password failed attempts lockout is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.4.2.1.3 Ensure password unlock time is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.4.2.2.2 Ensure password number of changed characters is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

4.4.2.2.3 Ensure password length is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

4.4.2.4.2 Ensure pam_unix does not include rememberCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

4.5.1.2 Ensure password expiration is 365 days or lessCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.5.2.3 Ensure system accounts are securedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.4 Ensure root password is setCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1.1 Ensure rsyslog is installedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.1.2.1.4 Ensure journald is not configured to receive logs from a remote clientCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

5.1.2.6 Ensure journald log rotation is configured per site policyCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.1.3 Ensure logrotate is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.3.28 Ensure SSH IgnoreUserKnownHosts is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.36 Ensure no '.shosts' files exist on the system - .shosts files exist on the systemCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.10 Ensure certificate status checking for PKI authenticationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth fail_intervalCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth unlock_timeCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth denyCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth even_deny_rootCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attemptsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.5.8 Ensure Default user umask is 077CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.1.1 Audit system file permissionsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.1.16 Ensure all world-writable directories are owned by root, sys, bin, or an application User IdentifierCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.2.9 Ensure root is the only UID 0 accountCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.2.18 Ensure there are no unnecessary accountsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.2.19 Ensure all local interactive user home directories are group-ownedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT