CIS Oracle Linux 6 Server L1 v1.1.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Oracle Linux 6 Server L1 v1.1.0

Updated: 10/29/2021

Authority: CIS

Plugin: Unix

Revision: 1.25

Estimated Item Count: 279

File Details

Filename: CIS_Oracle_Linux_6_Server_L1_v1.1.0.audit

Size: 373 kB

MD5: 6be7050c6cac04f08747199f7f7d0a5b
SHA256: 5e63f1a5858dc41a91c8ebc69dd3dd9559e4c4a1bdd3bfda8718320dfd300c26

Audit Changelog

 
Revision 1.25

Oct 29, 2021

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.24

Jun 17, 2021

Miscellaneous
  • Metadata updated.
  • References updated.
Revision 1.23

Oct 14, 2020

Functional Update
  • 4.2.4 Ensure permissions on all logfiles are configured
Revision 1.22

Oct 5, 2020

Functional Update
  • 1.7.2 Ensure GDM login banner is configured - banner message enabled
  • 1.7.2 Ensure GDM login banner is configured - banner message text
  • 2.2.1.1 Ensure time synchronization is in use
  • 2.2.1.2 Ensure ntp is configured - NTP Server
  • 2.2.1.2 Ensure ntp is configured - OPTIONS or ExecStart -u ntp:ntp
  • 2.2.1.2 Ensure ntp is configured - restrict -4
  • 2.2.1.2 Ensure ntp is configured - restrict -6
  • 2.2.1.3 Ensure chrony is configured - NTP server
  • 2.2.1.3 Ensure chrony is configured - OPTIONS
  • 4.2.1.1 Ensure rsyslog Service is enabled
  • 4.2.1.2 Ensure logging is configured
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.4 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.5 Ensure remote rsyslog messages are only accepted on designated log hosts. - $ModLoad imtcp
  • 4.2.1.5 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun 514
  • 4.2.2.1 Ensure syslog-ng service is enabled
  • 4.2.2.2 Ensure logging is configured
  • 4.2.2.3 Ensure syslog-ng default file permissions configured
  • 4.2.2.4 Ensure syslog-ng is configured to send logs to a remote log host - destination logserver
  • 4.2.2.4 Ensure syslog-ng is configured to send logs to a remote log host - log src
  • 4.2.2.5 Ensure remote syslog-ng messages are only accepted on designated log hosts
  • 4.2.3 Ensure rsyslog or syslog-ng is installed
Miscellaneous
  • Platform check updated.
Revision 1.21

Sep 30, 2020

Functional Update
  • 6.2.10 Ensure users' dot files are not group or world writable
Revision 1.20

Sep 29, 2020

Miscellaneous
  • References updated.
Revision 1.19

Aug 25, 2020

Functional Update
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
Revision 1.18

Aug 4, 2020

Functional Update
  • 1.7.1.1 Ensure message of the day is configured properly - mrsv
  • 1.7.1.2 Ensure local login warning banner is configured properly - mrsv
  • 1.7.1.3 Ensure remote login warning banner is configured properly - mrsv
  • 4.2.4 Ensure permissions on all logfiles are configured
  • 5.2.13 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax
  • 5.4.2 Ensure system accounts are non-login
Revision 1.17

Jul 28, 2020

Functional Update
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
Revision 1.16

Jul 15, 2020

Functional Update
  • 4.2.4 Ensure permissions on all logfiles are configured
  • 5.1.8 Ensure at/cron is restricted to authorized users - at.allow
  • 5.1.8 Ensure at/cron is restricted to authorized users - cron.allow
  • 5.2.11 Ensure only approved MAC algorithms are used
  • 5.4.1.1 Ensure password expiration is 365 days or less - users
  • 5.4.1.2 Ensure minimum days between password changes is 7 or more - users
  • 5.4.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.4.1.4 Ensure inactive password lock is 30 days or less - users
  • 5.4.2 Ensure system accounts are non-login
Informational Update
  • 5.2.11 Ensure only approved MAC algorithms are used