CIS Debian Family Server L1 v1.0.0

Audit Details

Name: CIS Debian Family Server L1 v1.0.0

Updated: 11/6/2024

Authority: CIS

Plugin: Unix

Revision: 1.33

Estimated Item Count: 302

File Details

Filename: CIS_Debian_Family_Linux_v1.0.0_L1_Server.audit

Size: 732 kB

MD5: a504d571ba26265733de4dcf62e728ef
SHA256: 8aa1ad90a79214a00eb13432c6a88d15db11b1a52a2de8387dda4faad9959650

Audit Changelog

 
Revision 1.33

Nov 6, 2024

Functional Update
  • 1.1.21 Ensure sticky bit is set on all world-writable directories
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • References updated.
Revision 1.32

Jun 17, 2024

Miscellaneous
  • Metadata updated.
Revision 1.31

Apr 22, 2024

Functional Update
  • 4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
Revision 1.30

Jan 7, 2024

Functional Update
  • 5.3.3 Ensure password reuse is limited
Miscellaneous
  • Metadata updated.
  • Variables updated.
Revision 1.29

Jan 3, 2024

Functional Update
  • 2.1.14 Ensure SNMP Server is not installed
Revision 1.28

Dec 8, 2023

Functional Update
  • 5.3.2 Ensure lockout for failed password attempts is configured - pam_tally2.so
Revision 1.27

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure journald is configured to send logs to rsyslog
  • 4.2.1.4 Ensure rsyslog default file permissions are configured
  • 4.2.1.5 Ensure logging is configured
  • 4.2.1.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote client
Revision 1.26

Sep 19, 2023

Functional Update
  • 1.1.21 Ensure sticky bit is set on all world-writable directories
  • 1.4.2 Ensure filesystem integrity is regularly checked
  • 3.1.2 Ensure wireless interfaces are disabled
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure journald is configured to send logs to rsyslog
  • 4.2.1.4 Ensure rsyslog default file permissions are configured
  • 4.2.1.5 Ensure logging is configured
  • 4.2.1.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote client
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • Variables updated.
Revision 1.25

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure journald is configured to send logs to rsyslog
  • 4.2.1.4 Ensure rsyslog default file permissions are configured
  • 4.2.1.5 Ensure logging is configured
  • 4.2.1.5 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.7 Ensure rsyslog is not configured to receive logs from a remote client
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled
  • 4.2.1.3 Ensure logging is configured - '*.*;mail.none;news.none -/var/log/messages'
  • 4.2.1.3 Ensure logging is configured - '*.=warning;*.=err -/var/log/warn'
  • 4.2.1.3 Ensure logging is configured - '*.crit /var/log/warn'
  • 4.2.1.3 Ensure logging is configured - '*.emerg :omusrmsg:*'
  • 4.2.1.3 Ensure logging is configured - 'local0,local1.* -/var/log/localmessages'
  • 4.2.1.3 Ensure logging is configured - 'local2,local3.* -/var/log/localmessages'
  • 4.2.1.3 Ensure logging is configured - 'local4,local5.* -/var/log/localmessages'
  • 4.2.1.3 Ensure logging is configured - 'local6,local7.* -/var/log/localmessages'
  • 4.2.1.3 Ensure logging is configured - 'mail.* -/var/log/mail'
  • 4.2.1.3 Ensure logging is configured - 'mail.err /var/log/mail.err'
  • 4.2.1.3 Ensure logging is configured - 'mail.info -/var/log/mail.info'
  • 4.2.1.3 Ensure logging is configured - 'mail.warning -/var/log/mail.warn'
  • 4.2.1.3 Ensure logging is configured - 'news.crit -/var/log/news/news.crit'
  • 4.2.1.3 Ensure logging is configured - 'news.err -/var/log/news/news.err'
  • 4.2.1.3 Ensure logging is configured - 'news.notice -/var/log/news/news.notice'
  • 4.2.1.4 Ensure rsyslog default file permissions configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - ModLoad imtcp
Revision 1.24

Jul 20, 2023

Functional Update
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
  • 5.4.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.3 Ensure all users' home directories exist
  • 6.2.4 Ensure users own their home directories
  • 6.2.5 Ensure users' home directories permissions are 750 or more restrictive