1.1.1.1 Ensure cramfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure freevxfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure hfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure hfsplus kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure jffs2 kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.9 Ensure unused filesystems kernel modules are not available | CONFIGURATION MANAGEMENT |
1.1.2.1.1 Ensure /tmp is a separate partition | CONFIGURATION MANAGEMENT |
1.1.2.1.2 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.2.1.3 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.1.4 Ensure noexec option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.1 Ensure /dev/shm is a separate partition | CONFIGURATION MANAGEMENT |
1.1.2.2.2 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.4 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.2 Ensure nodev option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.3 Ensure nosuid option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.2 Ensure nodev option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.3 Ensure nosuid option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.2 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.4 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.2 Ensure nodev option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.3 Ensure nosuid option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.4 Ensure noexec option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.2.1.1 Ensure GPG keys are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1.2 Ensure gpgcheck is globally activated | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1.4 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2.1 Ensure updates, patches, and additional security software are installed | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1.1 Ensure SELinux is installed | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.2 Ensure SELinux is not disabled in bootloader configuration | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.3 Ensure SELinux policy is configured | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.4 Ensure the SELinux mode is not disabled | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.7 Ensure the MCS Translation Service (mcstrans) is not installed | CONFIGURATION MANAGEMENT |
1.4.1 Ensure bootloader password is set | ACCESS CONTROL, MEDIA PROTECTION |
1.4.2 Ensure access to bootloader config is configured | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1 Ensure address space layout randomization is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure ptrace_scope is restricted | CONFIGURATION MANAGEMENT |
1.5.3 Ensure core dump backtraces are disabled | CONFIGURATION MANAGEMENT |
1.5.4 Ensure core dump storage is disabled | CONFIGURATION MANAGEMENT |
1.6.1 Ensure system wide crypto policy is not set to legacy | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.2 Ensure system wide crypto policy is not set in sshd configuration | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.3 Ensure system wide crypto policy disables sha1 hash and signature support | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.4 Ensure system wide crypto policy disables macs less than 128 bits | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.5 Ensure system wide crypto policy disables cbc for ssh | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.6 Ensure system wide crypto policy disables chacha20-poly1305 for ssh | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.7 Ensure system wide crypto policy disables EtM for ssh | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.7.1 Ensure message of the day is configured properly | ACCESS CONTROL |