800-53|CM-7(1)

Title

PERIODIC REVIEW

Description

The organization:

Supplemental

The organization can either make a determination of the relative security of the function, port, protocol, and/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.

Reference Item Details

Related: AC-18,CM-7,IA-2

Category: CONFIGURATION MANAGEMENT

Parent Title: LEAST FUNCTIONALITY

Family: CONFIGURATION MANAGEMENT

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1 Ensure packages are obtained from authorized repositoriesUnixCIS PostgreSQL 15 OS v1.0.0
1.1 Ensure packages are obtained from authorized repositoriesUnixCIS PostgreSQL 13 OS v1.1.0
1.1 Ensure packages are obtained from authorized repositoriesUnixCIS PostgreSQL 14 OS v1.1.0
1.1 Ensure packages are obtained from authorized repositoriesUnixCIS PostgreSQL 12 OS v1.1.0
1.1.1 Ensure Security Defaults is enabled on Azure Active Directorymicrosoft_azureCIS Microsoft Azure Foundations v1.5.0 L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS CentOS 7 v3.1.2 Workstation L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Oracle Linux 7 Workstation L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Red Hat EL7 Server L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Amazon Linux 2 v2.0.0 L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Red Hat EL7 Workstation L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Oracle Linux 7 Server L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Debian 8 Server L1 v2.0.2
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS CentOS 7 v3.1.2 Server L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmodUnixCIS Debian 8 Workstation L1 v2.0.2
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Red Hat EL7 Workstation L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Amazon Linux 2 v2.0.0 L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Oracle Linux 7 Workstation L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Red Hat EL7 Server L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Oracle Linux 7 Server L1 v3.1.1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Debian 8 Server L1 v2.0.2
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS CentOS 7 v3.1.2 Server L1
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS Debian 8 Workstation L1 v2.0.2
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobeUnixCIS CentOS 7 v3.1.2 Workstation L1
1.1.1.1 Ensure mounting of squashfs filesystems is disabledUnixCIS SUSE Linux Enterprise 15 Server L2 v1.1.1
1.1.1.1 Ensure mounting of squashfs filesystems is disabledUnixCIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1
1.1.1.1 Ensure mounting of squashfs filesystems is disabledUnixCIS SUSE Linux Enterprise Server 12 L2 v3.1.0
1.1.1.1 Ensure mounting of squashfs filesystems is disabledUnixCIS SUSE Linux Enterprise Workstation 12 L2 v3.1.0
1.1.1.1 Ensure mounting of udf filesystems is disabled - lsmodUnixCIS Google Container-Optimized OS L2 Server v1.1.0
1.1.1.1 Ensure mounting of udf filesystems is disabled - modprobeUnixCIS Google Container-Optimized OS L2 Server v1.1.0
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmodUnixCIS Debian 8 Workstation L1 v2.0.2
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmodUnixCIS Debian 8 Server L1 v2.0.2
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - modprobeUnixCIS Debian 8 Workstation L1 v2.0.2
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - modprobeUnixCIS Debian 8 Server L1 v2.0.2
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS CentOS 7 v3.1.2 Server L2
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Red Hat EL7 Workstation L2 v3.1.1
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Oracle Linux 7 Server L2 v3.1.1
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Amazon Linux 2 v2.0.0 L2
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Red Hat EL7 Server L2 v3.1.1
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS Oracle Linux 7 Workstation L2 v3.1.1
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodUnixCIS CentOS 7 v3.1.2 Workstation L2
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobeUnixCIS Amazon Linux 2 v2.0.0 L2
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - modprobeUnixCIS CentOS 7 v3.1.2 Workstation L2