1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of squashfs filesystems is disabled | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of squashfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.7 Ensure mounting of udf filesystems is disabled | CONFIGURATION MANAGEMENT |
1.1.1.7 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.3 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.4 Ensure nosuid option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.5 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.8 Ensure nodev option set on /var/tmp partition | CONFIGURATION MANAGEMENT |
1.1.9 Ensure nosuid option set on /var/tmp partition | CONFIGURATION MANAGEMENT |
1.1.10 Ensure noexec option set on /var/tmp partition | CONFIGURATION MANAGEMENT |
1.1.14 Ensure nodev option set on /home partition | CONFIGURATION MANAGEMENT |
1.1.15 Ensure nodev option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.16 Ensure nosuid option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.17 Ensure noexec option set on /dev/shm partition | CONFIGURATION MANAGEMENT |
1.1.18 Ensure nodev option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.19 Ensure nosuid option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.20 Ensure noexec option set on removable media partitions | CONFIGURATION MANAGEMENT |
1.1.21 Ensure sticky bit is set on all world-writable directories | CONFIGURATION MANAGEMENT |
1.2.1 Ensure package manager repositories are configured | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure gpgcheck is globally activated | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure GPG keys are configured | SYSTEM AND INFORMATION INTEGRITY |
1.2.4 Ensure Red Hat Network or Subscription Manager connection is configured | SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed | AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked | AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure permissions on bootloader config are configured | CONFIGURATION MANAGEMENT |
1.4.2 Ensure bootloader password is set | CONFIGURATION MANAGEMENT |
1.4.3 Ensure authentication required for single user mode - rescue.service | CONFIGURATION MANAGEMENT |
1.4.4 Ensure interactive boot is not enabled | CONFIGURATION MANAGEMENT |
1.5.1 Ensure core dumps are restricted - limits.conf, limits.d/* | CONFIGURATION MANAGEMENT |
1.5.1 Ensure core dumps are restricted - sysctl | CONFIGURATION MANAGEMENT |
1.5.2 Ensure XD/NX support is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctl.conf, /etc/sysctl.d/* | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.5.4 Ensure prelink is disabled | AUDIT AND ACCOUNTABILITY |
1.6.1.1 Ensure SELinux is installed | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - config | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | ACCESS CONTROL |