Nov 6, 2024 Functional Update- 6.1.11 Ensure no world writable files exist
- 6.1.12 Ensure no unowned files or directories exist
- 6.1.13 Ensure no ungrouped files or directories exist
- 6.1.14 Audit SUID executables
- 6.1.15 Audit SGID executables
- 6.1.2 Ensure sticky bit is set on all world-writable directories
|
Jul 24, 2024 Functional Update- 5.2.6 Ensure SSH PAM is enabled
|
Jul 19, 2024 Functional Update- 5.6.2 Ensure system accounts are secured
|
Jul 9, 2024 Functional Update- 5.1.9 Ensure at is restricted to authorized users
|
Jun 17, 2024 |
Jun 6, 2024 Miscellaneous- Metadata updated.
- References updated.
- Variables updated.
Added- 1.1.1.1 Ensure mounting of cramfs filesystems is disabled
- 1.1.2.1 Ensure /tmp is a separate partition
- 1.2.1 Ensure GPG keys are configured
- 1.2.2 Ensure gpgcheck is globally activated
- 1.3.2 Ensure filesystem integrity is regularly checked
- 1.4.3 Ensure authentication is required when booting into rescue mode
- 1.5.3 Ensure address space layout randomization (ASLR) is enabled
- 1.6.1.3 Ensure SELinux policy is configured
- 1.6.1.4 Ensure the SELinux mode is not disabled
- 1.8.2 Ensure GDM login banner is configured
- 1.8.3 Ensure last logged in user display is disabled
- 2.1.2 Ensure chrony is configured
- 2.2.10 Ensure a web server is not installed
- 2.2.11 Ensure IMAP and POP3 server is not installed
- 2.2.18 Ensure nfs-utils is not installed or the nfs-server service is masked
- 2.2.19 Ensure rpcbind is not installed or the rpcbind services are masked
- 3.2.2 Ensure packet redirect sending is disabled
- 3.3.1 Ensure source routed packets are not accepted
- 3.3.2 Ensure ICMP redirects are not accepted
- 3.3.3 Ensure secure ICMP redirects are not accepted
- 3.3.4 Ensure suspicious packets are logged
- 3.3.7 Ensure Reverse Path Filtering is enabled
- 3.3.9 Ensure IPv6 router advertisements are not accepted
- 3.4.1.1 Ensure firewalld is installed
- 3.4.1.3 Ensure nftables either not installed or masked with firewalld
- 3.4.1.4 Ensure firewalld service enabled and running
- 3.4.2.11 Ensure nftables rules are permanent
- 3.4.2.2 Ensure firewalld is either not installed or masked with nftables
- 3.4.2.4 Ensure iptables are flushed with nftables
- 3.4.2.6 Ensure nftables base chains exist
- 3.4.2.7 Ensure nftables loopback traffic is configured
- 3.4.2.8 Ensure nftables outbound and established connections are configured
- 3.4.2.9 Ensure nftables default deny firewall policy
- 3.4.3.1.3 Ensure firewalld is either not installed or masked with iptables
- 3.4.3.2.1 Ensure iptables loopback traffic is configured
- 3.4.3.2.4 Ensure iptables default deny firewall policy
- 3.4.3.2.6 Ensure iptables is enabled and active
- 3.4.3.3.1 Ensure ip6tables loopback traffic is configured
- 3.4.3.3.4 Ensure ip6tables default deny firewall policy
- 3.4.3.3.6 Ensure ip6tables is enabled and active
- 4.2.2.1.2 Ensure systemd-journal-remote is configured
- 5.2.10 Ensure SSH PermitUserEnvironment is disabled
- 5.2.11 Ensure SSH IgnoreRhosts is enabled
- 5.2.12 Ensure SSH X11 forwarding is disabled
- 5.2.16 Ensure SSH MaxAuthTries is set to 4 or less
- 5.2.17 Ensure SSH MaxStartups is configured
- 5.2.18 Ensure SSH MaxSessions is set to 10 or less
- 5.2.19 Ensure SSH LoginGraceTime is set to one minute or less
- 5.2.20 Ensure SSH Idle Timeout Interval is configured
- 5.2.4 Ensure SSH access is limited
- 5.2.5 Ensure SSH LogLevel is appropriate
- 5.2.6 Ensure SSH PAM is enabled
- 5.2.7 Ensure SSH root login is disabled
- 5.2.8 Ensure SSH HostbasedAuthentication is disabled
- 5.2.9 Ensure SSH PermitEmptyPasswords is disabled
- 5.4.2 Ensure authselect includes with-faillock
- 5.5.1 Ensure password creation requirements are configured
- 5.5.2 Ensure lockout for failed password attempts is configured
- 5.5.4 Ensure password hashing algorithm is SHA-512
- 5.6.1.1 Ensure password expiration is 365 days or less
- 5.6.1.2 Ensure minimum days between password changes is 7 or more
- 5.6.1.3 Ensure password expiration warning days is 7 or more
- 5.6.1.4 Ensure inactive password lock is 30 days or less
- 5.6.2 Ensure system accounts are secured
- 5.6.5 Ensure default user umask is 027 or more restrictive
|
Apr 22, 2024 Functional Update- 4.2.1.6 Ensure rsyslog is configured to send logs to a remote log host
|
Jan 22, 2024 Functional Update- 5.2.20 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax sshd output
|
Dec 27, 2023 Functional Update- 5.5.2 Ensure lockout for failed password attempts is configured - >= 8.2 unlock_time
|
Nov 17, 2023 Functional Update- 5.2.10 Ensure SSH PermitUserEnvironment is disabled - sshd output
- 5.2.11 Ensure SSH IgnoreRhosts is enabled - sshd output
- 5.2.12 Ensure SSH X11 forwarding is disabled - sshd output
- 5.2.15 Ensure SSH warning banner is configured
- 5.2.16 Ensure SSH MaxAuthTries is set to 4 or less - sshd output
- 5.2.17 Ensure SSH MaxStartups is configured - sshd output
- 5.2.18 Ensure SSH MaxSessions is set to 10 or less - sshd output
- 5.2.19 Ensure SSH LoginGraceTime is set to one minute or less - sshd output
- 5.2.20 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax sshd output
- 5.2.20 Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval sshd output
- 5.2.4 Ensure SSH access is limited - sshd output
- 5.2.5 Ensure SSH LogLevel is appropriate - sshd output
- 5.2.6 Ensure SSH PAM is enabled - sshd output
- 5.2.7 Ensure SSH root login is disabled - sshd output
- 5.2.8 Ensure SSH HostbasedAuthentication is disabled - sshd output
- 5.2.9 Ensure SSH PermitEmptyPasswords is disabled - sshd output
|