1.6.1.5 Ensure the SELinux mode is enforcing - getenforce | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
2.2.3 Ensure Avahi Server is not installed - avahi | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3.3 Ensure talk client is not installed | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.1.1 Disable IPv6 | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.2.1 Ensure IP forwarding is disabled - 'net.ipv4.ip_forward = 0 /sbin/sysctl' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.3.3 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects = 0 /etc/sysctl.conf /etc/sysctl.d/*' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.3.4 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians = 1 /etc/sysctl.conf /etc/sysctl.d/*' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.3.6 Ensure bogus ICMP responses are ignored - sysctl | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1 /etc/sysctl.conf /etc/sysctl.d/*' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1 /sbin/sysctl' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra = 0 /sbin/sysctl' | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.4.1 Ensure TCP Wrappers is installed | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.5 Ensure permissions on /etc/hosts.deny are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
3.5.2 Ensure SCTP is disabled | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
3.6.2.1 Ensure IPv4 default deny firewall policy - OUTPUT | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.6.2.2 Ensure IPv4 loopback traffic is configured - INPUT | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.6.2.4 Ensure IPv4 firewall rules exist for all open ports - iptables | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1.1.3 Ensure auditd service is enabled | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM 32-bit | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.2 Ensure rsyslog Service is enabled | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure rsyslog default file permissions configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2 Ensure permissions on all logfiles are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allow | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.6 Ensure SSH LogLevel is appropriate - sshd_config | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.8 Ensure SSH MaxAuthTries is set to 4 or less | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.9 Ensure SSH IgnoreRhosts is enabled | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
5.3.14 Ensure only strong Ciphers are used - approved ciphers | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.15 Ensure only strong MAC algorithms are used - sshd | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.16 Ensure only strong Key Exchange algorithms are used - sshd_config | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.20 Ensure SSH PAM is enabled - sshd | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
5.3.23 Ensure SSH MaxSessions is limited - sshd_config | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
5.4.1 Ensure password creation requirements are configured - password-auth dcredit | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1 Ensure password creation requirements are configured - password-auth ucredit | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1 Ensure password creation requirements are configured - system-auth lcredit | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1 Ensure password creation requirements are configured - system-auth ucredit | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.2 Ensure lockout for failed password attempts is configured - password-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - system-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.3 Ensure password reuse is limited - password-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.4 Ensure password hashing algorithm is SHA-512 - system-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.5 Ensure default user umask is configured - system wide umask | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
6.1.6 Ensure permissions on /etc/shadow are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.6 Ensure root is the only UID 0 account | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.8 Ensure all users' home directories exist | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
6.2.9 Ensure users own their home directories | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.12 Ensure no users have .forward files | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
6.2.14 Ensure no users have .rhosts files | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |