1.1.2.1.2 Ensure nodev option set on /tmp partition | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.2 Ensure nodev option set on /home partition | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.3 Ensure nosuid option set on /home partition | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.2.1.4 Ensure package manager repositories are configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1.1 Ensure SELinux is installed | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.5.2 Ensure fs.protected_hardlinks is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.5.6 Ensure kernel.kptr_restrict is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
1.8.1 Ensure GDM login banner is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
2.1.4 Ensure dhcp server services are not in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.5 Ensure dns server services are not in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.7 Ensure ftp server services are not in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.16 Ensure tftp server services are not in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.1.3 Ensure bluetooth services are not in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.2.2 Ensure can kernel module is not available | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.2.4 Ensure tipc kernel module is not available | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.2.6 Ensure sctp kernel module is not available | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.1.3 Ensure net.ipv4.conf.default.forwarding is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.1.6 Ensure net.ipv4.icmp_ignore_bogus_error_responses is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.1.9 Ensure net.ipv4.conf.default.accept_redirects is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
3.3.1.18 Ensure net.ipv4.tcp_syncookies is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
4.1.1 Ensure firewalld is installed | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1.4 Ensure firewalld active zone target is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.2 Ensure access to SSH private host key files is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.5 Ensure sshd Banner is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.6 Ensure sshd Ciphers are configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.11 Ensure sshd IgnoreRhosts is enabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.16 Ensure sshd MaxAuthTries is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
5.1.17 Ensure sshd MaxStartups is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.18 Ensure sshd MaxSessions is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.20 Ensure sshd PermitRootLogin is disabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.22 Ensure sshd UsePAM is enabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.1 Ensure sudo is installed | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.6 Ensure sudo timestamp_timeout is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.1.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1.4 Ensure pam_pwhistory module is enabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1.5 Ensure pam_unix module is enabled | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.2.2 Ensure password length is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.2.5 Ensure password maximum sequential characters is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.2.7 Ensure password quality is enforced for the root user | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.3.2 Ensure password history is enforced for the root user | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
6.2.1.3 Ensure journald log file rotation is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.2.1.4 Ensure only one logging system is in use | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.2.3.4 Ensure rsyslog log file creation mode is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
7.1.4 Ensure access to /etc/group- is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.9 Ensure access to /etc/shells is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.13 Ensure SUID and SGID files are reviewed | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.2.7 Ensure no duplicate group names exist | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.9 Ensure local interactive user dot files access is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |