1.1.1.7 Ensure squashfs kernel module is not available | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.1.6 Ensure separate partition exists for /var | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1.7 Ensure separate partition exists for /var/tmp | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1.11 Ensure separate partition exists for /var/log | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
2.2.3 Ensure Avahi Server is not installed - avahi | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.3 Ensure Avahi Server is not installed - avahi | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.1.2 Ensure augenrules is enabled | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.4 Ensure auditing for processes that start prior to auditd is enabled | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt' | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.3 Ensure events that modify date and time information are collected - auditctl /etc/localtime | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.3 Ensure events that modify date and time information are collected - auditctl adjtimex settimeofday 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.3 Ensure events that modify date and time information are collected - auditctl adjtimex settimeofday 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.3 Ensure events that modify date and time information are collected - rules.d /etc/localtime | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.3 Ensure events that modify date and time information are collected - rules.d stime 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadow | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/group | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/group | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/gshadow | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/gshadow | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/security/opasswd | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/shadow | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/sysconfig/network | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/issue | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/ | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/ | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.7 Ensure login and logout events are collected - rules.d /var/run/faillock/ | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.8 Ensure session initiation information is collected - auditctl /var/run/utmp | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.9 Ensure discretionary access control permission modification events are collected - auditctl chmod 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.9 Ensure discretionary access control permission modification events are collected - auditctl setxattr 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chmod 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chown 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.9 Ensure discretionary access control permission modification events are collected - rules.d chown 32-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.9 Ensure discretionary access control permission modification events are collected - rules.d setxattr 32-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES 32-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.10 Ensure unsuccessful unauthorized file access attempts are collected - rules.d EACCES 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.13 Ensure file deletion events by users are collected - rules.d 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/ | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.15 Ensure system administrator command executions (sudo) are collected - rules.d 64-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.16 Ensure kernel module loading and unloading is collected - auditctl /sbin/modprobe | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.16 Ensure kernel module loading and unloading is collected - auditctl /sbin/rmmod | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.16 Ensure kernel module loading and unloading is collected - auditctl modules | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.16 Ensure kernel module loading and unloading is collected - rules.d /sbin/insmod | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
4.1.16 Ensure kernel module loading and unloading is collected - rules.d modules | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/profile | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |