CIS Debian Linux 11 Workstation L1 v1.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Debian Linux 11 Workstation L1 v1.0.0

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.41

Estimated Item Count: 309

File Details

Filename: CIS_Debian_Linux_11_v1.0.0_L1_Workstation.audit

Size: 913 kB

MD5: c20635607236c1bd5cdfb0f364551b81
SHA256: 92259c85a13c0e12e67f08d496ab3dab85870a68d8b4c922d4cd21ebeeae5bc9

Audit Items

DescriptionCategories
1.1.1.1 Ensure mounting of cramfs filesystems is disabled
1.1.2.1 Ensure /tmp is a separate partition
1.1.2.2 Ensure nodev option set on /tmp partition
1.1.2.3 Ensure noexec option set on /tmp partition
1.1.2.4 Ensure nosuid option set on /tmp partition
1.1.3.2 Ensure nodev option set on /var partition
1.1.3.3 Ensure nosuid option set on /var partition
1.1.4.2 Ensure noexec option set on /var/tmp partition
1.1.4.3 Ensure nosuid option set on /var/tmp partition
1.1.4.4 Ensure nodev option set on /var/tmp partition
1.1.5.2 Ensure nodev option set on /var/log partition
1.1.5.3 Ensure noexec option set on /var/log partition
1.1.5.4 Ensure nosuid option set on /var/log partition
1.1.6.2 Ensure noexec option set on /var/log/audit partition
1.1.6.3 Ensure nodev option set on /var/log/audit partition
1.1.6.4 Ensure nosuid option set on /var/log/audit partition
1.1.7.2 Ensure nodev option set on /home partition
1.1.7.3 Ensure nosuid option set on /home partition
1.1.8.1 Ensure nodev option set on /dev/shm partition
1.1.8.2 Ensure noexec option set on /dev/shm partition
1.1.8.3 Ensure nosuid option set on /dev/shm partition
1.2.1 Ensure package manager repositories are configured
1.2.2 Ensure GPG keys are configured
1.3.1 Ensure AIDE is installed - aide
1.3.1 Ensure AIDE is installed - aide-common
1.3.2 Ensure filesystem integrity is regularly checked
1.4.1 Ensure bootloader password is set - 'passwd_pbkdf2'
1.4.1 Ensure bootloader password is set - 'set superusers'
1.4.2 Ensure permissions on bootloader config are configured
1.4.3 Ensure authentication required for single user mode
1.5.1 Ensure address space layout randomization (ASLR) is enabled - config
1.5.1 Ensure address space layout randomization (ASLR) is enabled - sysctl
1.5.2 Ensure prelink is not installed
1.5.3 Ensure Automatic Error Reporting is not enabled
1.5.4 Ensure core dumps are restricted - limits config
1.5.4 Ensure core dumps are restricted - processsizemax
1.5.4 Ensure core dumps are restricted - storage
1.5.4 Ensure core dumps are restricted - sysctl
1.5.4 Ensure core dumps are restricted - sysctl config
1.6.1.1 Ensure AppArmor is installed - apparmor
1.6.1.1 Ensure AppArmor is installed - apparmor-utils
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - security
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - loaded
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfined
1.7.1 Ensure message of the day is configured properly - banner
1.7.1 Ensure message of the day is configured properly - platform flags
1.7.2 Ensure local login warning banner is configured properly - banner
1.7.2 Ensure local login warning banner is configured properly - platform flags
1.7.3 Ensure remote login warning banner is configured properly - banner