Item Search

NameAudit NamePluginCategory
1.1.2.12 Ensure all non-root local partitions are mounted with the "nodev" optionCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.4.4 Ensure the operating system requires authentication upon booting into emergency modeCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.4.6 Ensure a unique name is set as the superusers account (UEFI)CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.5.8 Ensure the operating system enables hardening for the BPF JITCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.5.10 Ensure the NX (no-execution) bit flag is set on the systemCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.20 Ensure the operating system restricts usage of ptrace to descendant processesCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.5.21 Ensure the operating system prevents privilege escalation through the kernel by disabling access to the bpf syscallCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.12 Ensure the operating system initiates a session lock a for graphical user interfaces when the screensaver is activatedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.1.6 Ensure ftp server services are not in useCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.1.28 Ensure the gssproxy package has not been installed on the systemCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.1.29 Ensure the iprutils package has not been installed on the systemCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

4.1.2 Ensure the firewall is configured to remove unnecessary use of functions, ports, protocols, and/or servicesCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.1.10 Ensure sshd GSSAPIAuthentication is disabledCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.1.25 Ensure sshd X11Forwarding is disabledCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.2 Ensure the sudoers file has the default include directoryCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.6 Ensure the sudoers file restricts sudo access to authorized personnelCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.9 Ensure sudo timestamp_timeout is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.4.3.12 Ensure the operating system's shell initialization file is configured to start each shell with the tmux terminal multiplexerCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.3.13 Ensure the operating system enables the user to initiate a session lockCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

6.2.3.8 Ensure administrators are notified if an audit processing failure occurs by modifying /etc/aliasesCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.2.5 Ensure the operating system allocates audit record storage capacityCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.7 Ensure unsuccessful file access attempts are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.7 Ensure unsuccessful file access attempts are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.18 Ensure successful and unsuccessful attempts to use the usermod command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.18 Ensure successful and unsuccessful attempts to use the usermod command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.25 Ensure successful and unsuccessful attempts to use the crontab command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.26 Ensure successful and unsuccessful attempts to use the gpasswd command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.32 Ensure successful and unsuccessful attempts to use the userhelper command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.33 Ensure successful and unsuccessful attempts to use the setfiles command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure successful and unsuccessful attempts to use the postqueue command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.36 Ensure successful and unsuccessful attempts to use the postdrop command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.39 Ensure successful and unsuccessful attempts to use the mount command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.40 Ensure successful and unsuccessful attempts to use the ssh-agent command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.42 Ensure successful and unsuccessful attempts to use the chage command are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.43 Ensure the audit system prevents unauthorized changes to logon UIDsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.4.3 Ensure audit log files owner is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

6.3.4.3 Ensure audit log files owner is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

6.3.4.3 Ensure audit log files owner is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.3.4.5 Ensure audit configuration files mode is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.4.5 Ensure audit configuration files mode is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.4.5 Ensure audit configuration files mode is configuredCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.4.13 Ensure the audit tools are owned by rootCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.4.15 Ensure the audit log file directories are mode 0700 or more restrictiveCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.4.17 Ensure audit log files group owner is rootCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

7.2.2 Ensure /etc/shadow password fields are not emptyCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

7.2.2 Ensure /etc/shadow password fields are not emptyCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

7.2.11 Ensure all files and directories in the local interactive user home directory are group-owned by a group that the user is a member ofCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT