CIS Debian Linux 11 Server L1 v1.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Debian Linux 11 Server L1 v1.0.0

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.40

Estimated Item Count: 317

File Details

Filename: CIS_Debian_Linux_11_v1.0.0_L1_Server.audit

Size: 943 kB

MD5: ca6c971f1c4f6376bab53f3f210a146b
SHA256: 951fbca01e0646d1e6db1fe0aa4d9c59366ba75b79c77c08422ab5c6050ff327

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled
1.1.2.1 Ensure /tmp is a separate partition
1.1.2.2 Ensure nodev option set on /tmp partition
1.1.2.3 Ensure noexec option set on /tmp partition
1.1.2.4 Ensure nosuid option set on /tmp partition
1.1.3.2 Ensure nodev option set on /var partition
1.1.3.3 Ensure nosuid option set on /var partition
1.1.4.2 Ensure noexec option set on /var/tmp partition
1.1.4.3 Ensure nosuid option set on /var/tmp partition
1.1.4.4 Ensure nodev option set on /var/tmp partition
1.1.5.2 Ensure nodev option set on /var/log partition
1.1.5.3 Ensure noexec option set on /var/log partition
1.1.5.4 Ensure nosuid option set on /var/log partition
1.1.6.2 Ensure noexec option set on /var/log/audit partition
1.1.6.3 Ensure nodev option set on /var/log/audit partition
1.1.6.4 Ensure nosuid option set on /var/log/audit partition
1.1.7.2 Ensure nodev option set on /home partition
1.1.7.3 Ensure nosuid option set on /home partition
1.1.8.1 Ensure nodev option set on /dev/shm partition
1.1.8.2 Ensure noexec option set on /dev/shm partition
1.1.8.3 Ensure nosuid option set on /dev/shm partition
1.1.9 Disable Automounting
1.1.10 Disable USB Storage - blacklist
1.1.10 Disable USB Storage - lsmod
1.1.10 Disable USB Storage - modprobe
1.2.1 Ensure package manager repositories are configured
1.2.2 Ensure GPG keys are configured
1.3.1 Ensure AIDE is installed - aide
1.3.1 Ensure AIDE is installed - aide-common
1.3.2 Ensure filesystem integrity is regularly checked
1.4.1 Ensure bootloader password is set - 'passwd_pbkdf2'
1.4.1 Ensure bootloader password is set - 'set superusers'
1.4.2 Ensure permissions on bootloader config are configured
1.4.3 Ensure authentication required for single user mode
1.5.1 Ensure address space layout randomization (ASLR) is enabled - config
1.5.1 Ensure address space layout randomization (ASLR) is enabled - sysctl
1.5.2 Ensure prelink is not installed
1.5.3 Ensure Automatic Error Reporting is not enabled
1.5.4 Ensure core dumps are restricted - limits config
1.5.4 Ensure core dumps are restricted - processsizemax
1.5.4 Ensure core dumps are restricted - storage
1.5.4 Ensure core dumps are restricted - sysctl
1.5.4 Ensure core dumps are restricted - sysctl config
1.6.1.1 Ensure AppArmor is installed - apparmor
1.6.1.1 Ensure AppArmor is installed - apparmor-utils
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - security
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - loaded
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfined
1.7.1 Ensure message of the day is configured properly - banner