Item Search

NameAudit NamePluginCategory
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmodCIS Debian Family Workstation L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure source routed packets are not accepted - files 'net.ipv6.conf.default.accept_source_route = 0'CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure source routed packets are not accepted - net.ipv6.conf.all.accept_source_route = 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.2 Ensure ICMP redirects are not accepted - files net.ipv4.conf.all.accept_redirects= 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.3 Ensure secure ICMP redirects are not accepted - files net.ipv4.conf.all.secure_redirects = 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.3 Ensure secure ICMP redirects are not accepted - net.ipv4.conf.default.secure_redirects = 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.4 Ensure suspicious packets are logged - files net.ipv4.conf.all.log_martians = 1CIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

3.3.5 Ensure broadcast ICMP requests are ignored - files net.ipv4.icmp_echo_ignore_broadcasts = 1CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.6 Ensure bogus ICMP responses are ignored - files net.ipv4.icmp_ignore_bogus_error_responses = 1CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - files net.ipv4.conf.default.rp_filter = 1CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - net.ipv4.conf.all.rp_filter = 1CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.9 Ensure IPv6 router advertisements are not accepted - files net.ipv6.conf.all.accept_ra = 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.9 Ensure IPv6 router advertisements are not accepted - net.ipv6.conf.all.accept_ra = 0CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.6.1.4 Ensure loopback traffic is configured - allow in v4CIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.1.4 Ensure loopback traffic is configured - allow in v6CIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.1.4 Ensure loopback traffic is configured - deny in from 127.0.0.0/8CIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.2.5 Ensure base chains exist - forwardCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.2.6 Ensure loopback traffic is configured - v4CIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.2.10 Ensure nftables rules are permanentCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.3.2.1 Ensure default deny firewall policy - INPUTCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.3.2.4 Ensure firewall rules exist for all open portsCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.1.3 Ensure journald is configured to send logs to rsyslogCIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote clientCIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.2.2.3 Ensure journald is configured to write logfiles to persistent diskCIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.3 Ensure permissions on all logfiles are configuredCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Ensure cron daemon is enabled and running - is-enabledCIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.allowCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.3 Ensure permissions on SSH public host key files are configuredCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.8 Ensure SSH HostbasedAuthentication is disabledCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH root login is disabledCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.13 Ensure only strong MAC algorithms are usedCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong Key Exchange algorithms are usedCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure SSH Idle Timeout Interval is configured - ClientAliveIntervalCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.17 Ensure SSH access is limitedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.22 Ensure SSH MaxSessions is limitedCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.1 Ensure password creation requirements are configured - minlenCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.1 Ensure password creation requirements are configured - password complexityCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.2 Ensure lockout for failed password attempts is configured - pam_deny.soCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - pam_tally2.soCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - usersCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.4 Ensure inactive password lock is 30 days or less - usersCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.3 Ensure default group for the root account is GID 0CIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.13 Audit SUID executablesCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

6.2.10 Ensure root is the only UID 0 accountCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION