CIS CentOS Linux 8 Server L2 v1.0.1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS CentOS Linux 8 Server L2 v1.0.1

Updated: 6/1/2022

Authority: CIS

Plugin: Unix

Revision: 1.3

Estimated Item Count: 135

File Details

Filename: CIS_CentOS_8_Server_v1.0.1_L2.audit

Size: 343 kB

MD5: 8530f66e968def018c20e8989856158d
SHA256: 976f75b88530a5892aa3f67d85f7b823b5a0f716491313cdd907f5b39a4f7a20

Audit Items

DescriptionCategories
1.1.1.2 Ensure mounting of vFAT filesystems is limited - /etc/fstab
1.1.1.2 Ensure mounting of vFAT filesystems is limited - lsmod
1.1.1.2 Ensure mounting of vFAT filesystems is limited - modprobe
1.1.6 Ensure separate partition exists for /var
1.1.7 Ensure separate partition exists for /var/tmp
1.1.11 Ensure separate partition exists for /var/log
1.1.12 Ensure separate partition exists for /var/log/audit
1.1.13 Ensure separate partition exists for /home
1.7.1.1 Ensure SELinux is installed
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration
1.7.1.3 Ensure SELinux policy is configured - /etc/selinux/config
1.7.1.3 Ensure SELinux policy is configured - sestatus
1.7.1.4 Ensure the SELinux state is enforcing - /etc/selinux/config
1.7.1.4 Ensure the SELinux state is enforcing - Current mode: enforcing
1.7.1.4 Ensure the SELinux state is enforcing - Mode from config file: enforcing
1.7.1.4 Ensure the SELinux state is enforcing - SELinux status: enabled
1.7.1.5 Ensure no unconfined services exist
1.7.1.6 Ensure SETroubleshoot is not installed
1.7.1.7 Ensure the MCS Translation Service (mcstrans) is not installed
1.11 Ensure system-wide crypto policy is FUTURE or FIPS
3.3.1 Ensure DCCP is disabled - lsmod
3.3.1 Ensure DCCP is disabled - modprobe
3.3.2 Ensure SCTP is disabled - lsmod
3.3.2 Ensure SCTP is disabled - modprobe
3.3.3 Ensure RDS is disabled - lsmod
3.3.3 Ensure RDS is disabled - modprobe
3.3.4 Ensure TIPC is disabled - lsmod
3.3.4 Ensure TIPC is disabled - modprobe
3.6 Disable IPv6
4.1.1.1 Ensure auditd is installed - audit
4.1.1.1 Ensure auditd is installed - audit-libs
4.1.1.2 Ensure auditd service is enabled
4.1.1.3 Ensure auditing for processes that start prior to auditd is enabled
4.1.1.4 Ensure audit_backlog_limit is sufficient
4.1.2.1 Ensure audit log storage size is configured
4.1.2.2 Ensure audit logs are not automatically deleted
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = email
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = halt
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = root
4.1.3 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers
4.1.3 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.d
4.1.3 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers
4.1.3 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d
4.1.4 Ensure login and logout events are collected - auditctl faillock
4.1.4 Ensure login and logout events are collected - auditctl lastlog
4.1.4 Ensure login and logout events are collected - faillock
4.1.4 Ensure login and logout events are collected - lastlog
4.1.5 Ensure session initiation information is collected - auditctl btmp
4.1.5 Ensure session initiation information is collected - auditctl utmp
4.1.5 Ensure session initiation information is collected - auditctl wtmp