BSI-100-2: S 4.13: Careful allocation of identifiers: Every GID must be unique | BSI-100-2 Red Hat Linux 2005 | Unix | IDENTIFICATION AND AUTHENTICATION |
BSI-100-2: S 4.13: Careful allocation of identifiers: Every group ID (GID) must be unique - Duplicate GID | BSI-100-2 Red Hat Linux 2005 | Unix | IDENTIFICATION AND AUTHENTICATION |
BSI-100-2: S 4.13: Careful allocation of identifiers: UID 0 - /etc/group | BSI-100-2 Red Hat Linux 2005 | Unix | IDENTIFICATION AND AUTHENTICATION |
BSI-100-2: S 4.13: Careful allocation of identifiers: UID 0 - /etc/passwd | BSI-100-2 Red Hat Linux 2005 | Unix | IDENTIFICATION AND AUTHENTICATION |
BSI-100-2: S 4.18: Administrative and technical means to control access to the system-monitor and single-user mode: sulogin | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.21: Preventing unauthorised acquisition of administrator rights: Administrative tasks should only be performed from console | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.21: Preventing unauthorised acquisition of administrator rights: Limiting access to su | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.22: Prevention of loss of confidentiality of sensitive data in the Unix system: Restrict access to commands | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.22: Prevention of loss of confidentiality of sensitive data in the Unix system: TFTP service | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.25: Use of logging in Unix systems: Dedicated loghost | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.96: Deactivating DNS | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: ~/.Xclients.kde - 'xhost +' should never be used. | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: ~/.xsession - 'xhost +' should never be used. | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: HTTP - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: No world writeable directories | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: No world writeable files | BSI-100-2 Red Hat Linux 2005 | Unix | ACCESS CONTROL |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: POP3 - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: Portmap - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: REXECD - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: RLOGIND - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.105: Initial measures after a Unix standard installation: Sendmail - Remove non-required services from /etc/inetd.conf | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert root | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert;kern.err;daemon.err | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.emerg | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.err | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - cron.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - daemon.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - kern.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - local0,local1.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - local2,local3,local4.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - news,uucp.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - user.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: Only system administrators can read the files contained in /var/adm | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.106: Activation of system logging: Only system administrators can read the files contained in /var/log | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.151: Secure installation of Internet PCs: Disable any special services for remote administration (SWAT) | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.151: Secure installation of Internet PCs: Do not start the inetd (xinetd) daemon | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.151: Secure installation of Internet PCs: Do not start the portmap daemon | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.151: Secure installation of Internet PCs: The Linux packet filter function ipchains can be used | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.200: Handling of USB storage media: It is possible to prevent the device driver for USB storage media from starting up | BSI-100-2 Windows 2005 | Windows | CONFIGURATION MANAGEMENT |
BSI-100-2: S 4.249: Use of virus protection programs: Keeping Windows client systems up to date: Updating methods | BSI-100-2 Windows 2005 | Windows | SYSTEM AND INFORMATION INTEGRITY |
BSI-100-2: S 4.284: Handling of services under Windows Server 2003 and higher: Logon as a service (Undefined) | BSI-100-2 Windows 2005 | Windows | ACCESS CONTROL |
BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit account management (Success, Failure) | BSI-100-2 Windows 2005 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit policy change (Success, Failure) | BSI-100-2 Windows 2005 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit privilege use (Failure) | BSI-100-2 Windows 2005 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Audit process tracking (No auditing) | BSI-100-2 Windows 2005 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.344: Monitoring of Windows Vista, Windows 7 and Windows Server 2008 systems: Retain security log for (Undefined) | BSI-100-2 Windows 2005 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 5.18: Use of the NIS security mechanisms: The file /etc/bootparams must not contain the entry +::0:0::: | BSI-100-2 Red Hat Linux 2005 | Unix | IDENTIFICATION AND AUTHENTICATION |
BSI-100-2: S 5.18: Use of the NIS security mechanisms: The file /etc/group must not contain the entry +::0:0::: | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
BSI-100-2: S 5.56: Secure operation of a mail server: The mail server must be protected against use as a spam relay | BSI-100-2 Red Hat Linux 2005 | Unix | CONFIGURATION MANAGEMENT |
RedHat/CentOS 5 is installed | BSI-100-2 Red Hat Linux 2005 | Unix | |