1.1.1.2 Ensure freevxfs kernel module is not available | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.1.2.1.3 Ensure nosuid option set on /tmp partition | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.1 Ensure /dev/shm is a separate partition | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.1.2.3.2 Ensure nodev option set on /home partition | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.3 Ensure nosuid option set on /var/log partition | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.2.2 Ensure gpgcheck is globally activated | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.5.1.2 Ensure SELinux is not disabled in bootloader configuration | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1.3 Ensure SELinux policy is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.4 Ensure access to /etc/motd is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.2.2 Ensure avahi daemon services are not in use | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.5 Ensure dnsmasq services are not in use | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.17 Ensure web proxy server services are not in use | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.1.1 Ensure IPv6 status is identified | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.1.2 Ensure wireless interfaces are disabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.1 Ensure ip forwarding is disabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.6 Ensure secure icmp redirects are not accepted | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.4.1.2 Ensure a single firewall configuration utility is in use | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.2.3 Ensure firewalld drops unnecessary services and ports | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.3.3 Ensure an nftables table exists | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.3.4 Ensure nftables base chains exist | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.4.1.1 Ensure iptables packages are installed | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.4.2.4 Ensure iptables default deny firewall policy | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.4.2.6 Ensure iptables service is enabled and active | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.2 Ensure permissions on SSH private host key files are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.4 Ensure sshd access is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.5 Ensure sshd Banner is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.2.15 Ensure sshd MACs are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.16 Ensure sshd MaxAuthTries is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.2.20 Ensure sshd PermitRootLogin is disabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.2.22 Ensure sshd UsePAM is enabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
4.3.1 Ensure sudo is installed | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.3.7 Ensure access to the su command is restricted | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.4.2.1.1 Ensure pam_faillock module is enabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.2.5 Ensure password same consecutive characters is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.4 Ensure inactive password lock is 30 days or less | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.3.2 Ensure default user shell timeout is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.2.3 Ensure journald is configured to compress large log files | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
5.1.2.5 Ensure journald is not configured to send logs to rsyslog | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
5.3.2 Ensure filesystem integrity is regularly checked | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
6.1.4 Ensure permissions on /etc/group- are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.6 Ensure permissions on /etc/shadow- are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.9 Ensure permissions on /etc/shells are configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.12 Ensure no unowned or ungrouped files or directories exist | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.13 Ensure SUID and SGID files are reviewed | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.1 Ensure accounts in /etc/passwd use shadowed passwords | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.2.9 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.11 Ensure local interactive user dot files access is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |