CIS Fedora 19 Family Linux Workstation L1 v1.0.0

Audit Details

Name: CIS Fedora 19 Family Linux Workstation L1 v1.0.0

Updated: 11/6/2024

Authority: CIS

Plugin: Unix

Revision: 1.26

Estimated Item Count: 300

File Details

Filename: CIS_Fedora_19_Family_Linux_Workstation_L1_v1.0.0.audit

Size: 816 kB

MD5: d6f8ea5a4d1e082ddd48dfbb32431d4e
SHA256: 9114d18fe7f2e8d01c0ed9a221ec1da00c9c4266c765e4d6ae9f15f7901cb71b

Audit Changelog

 
Revision 1.26

Nov 6, 2024

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • References updated.
Revision 1.25

Jun 17, 2024

Miscellaneous
  • Metadata updated.
Revision 1.24

Apr 22, 2024

Functional Update
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • Metadata updated.
Revision 1.23

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.22

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.21

Oct 6, 2023

Functional Update
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain FORWARD
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain INPUT
  • 3.5.3.3.1 Ensure IPv6 default deny firewall policy - Chain OUTPUT
  • 3.5.3.3.2 Ensure IPv6 loopback traffic is configured - INPUT
  • 3.5.3.3.2 Ensure IPv6 loopback traffic is configured - OUTPUT
  • 3.5.3.3.3 Ensure IPv6 outbound and established connections are configured
  • 3.5.3.3.4 Ensure IPv6 firewall rules exist for all open ports
  • 3.5.3.3.5 Ensure ip6tables rules are saved - FORWARD
  • 3.5.3.3.5 Ensure ip6tables rules are saved - INPUT
  • 3.5.3.3.5 Ensure ip6tables rules are saved - OUTPUT
  • 3.5.3.3.6 Ensure ip6tables is enabled and running - is-enabled
  • 3.5.3.3.6 Ensure ip6tables is enabled and running - status
Revision 1.20

Sep 19, 2023

Functional Update
  • 1.1.22 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.3 Ensure permissions on all logfiles are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.19

Aug 8, 2023

Functional Update
  • 2.2.15 Ensure net-snmp is not installed
Revision 1.18

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - is-enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - status
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - ModLoad imtcp
Revision 1.17

Jul 20, 2023

Functional Update
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
  • 5.4.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.4 Ensure root PATH Integrity
  • 6.2.5 Ensure all users' home directories exist
  • 6.2.6 Ensure users' home directories permissions are 750 or more restrictive
  • 6.2.7 Ensure users own their home directories