Item Search

NameAudit NamePluginCategory
1.1.1.1 Ensure cramfs kernel module is not availableCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.1.1 Ensure /tmp is a separate partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.1.4 Ensure noexec option set on /tmp partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.2 Ensure nodev option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.4 Ensure noexec option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.3 Ensure nosuid option set on /home partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.2 Ensure nodev option set on /var/log partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.2.1.1 Ensure GPG keys are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.6.2 Ensure system wide crypto policy is not set in sshd configurationCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.8.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

MEDIA PROTECTION

2.1.2 Ensure avahi daemon services are not in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.5 Ensure dnsmasq services are not in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.6 Ensure samba file server services are not in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.5 Ensure tftp client is not installedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.3.1 Ensure time synchronization is in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

2.3.3 Ensure chrony is not run as the root userCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

2.4.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

2.4.1.8 Ensure crontab is restricted to authorized usersCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

2.4.2.1 Ensure at is restricted to authorized usersCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

3.3.2 Ensure packet redirect sending is disabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.7 Ensure reverse path filtering is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.8 Ensure source routed packets are not acceptedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

4.3.2 Ensure nftables established connections are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3.4 Ensure nftables loopback traffic is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.13 Ensure sshd IgnoreRhosts is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.1.16 Ensure sshd MaxAuthTries is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.1.22 Ensure sshd UsePAM is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.2.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.1.1 Ensure latest version of pam is installedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3.1.2 Ensure password unlock time is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.2.4 Ensure password same consecutive characters is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3.3.2 Ensure password history is enforced for the root userCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3.4.1 Ensure pam_unix does not include nullokCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3.4.4 Ensure pam_unix includes use_authtokCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.2.5 Ensure root path integrityCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

5.4.3.3 Ensure default user umask is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Ensure permissions on /etc/passwd- are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4 Ensure permissions on /etc/group- are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/shadow are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/shadow- are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.11 Ensure world writable files and directories are securedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.2.1.2 Ensure systemd-journal-upload authentication is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.1 Ensure rsyslog is installedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.7 Ensure rsyslog is not configured to receive logs from a remote clientCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

7.2.1 Ensure accounts in /etc/passwd use shadowed passwordsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2.6 Ensure no duplicate user names existCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION