1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.3 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.1.3 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.2 Ensure /tmp is configured | ACCESS CONTROL, MEDIA PROTECTION |
1.1.3 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.4 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.1.5 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.6 Ensure /dev/shm is configured - fstab | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.6 Ensure /dev/shm is configured - mount | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.7 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.8 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.9 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.12 Ensure /var/tmp partition includes the noexec option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.13 Ensure /var/tmp partition includes the nodev option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.14 Ensure /var/tmp partition includes the nosuid option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.18 Ensure /home partition includes the nodev option | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.20 Ensure removable media partitions include noexec option | ACCESS CONTROL, MEDIA PROTECTION |
1.1.21 Ensure nodev option set on removable media partitions | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.1.22 Ensure nosuid option set on removable media partitions | ACCESS CONTROL, MEDIA PROTECTION |
1.1.25 Ensure sticky bit is set on all world-writable directories | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
1.2.1 Ensure GPG keys are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure gpgcheck is globally activated | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure bootloader password is set | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.2 Ensure permissions on bootloader config are configured - grub.cfg | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.2 Ensure permissions on bootloader config are configured - user.cfg | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.3 Ensure authentication required for single user mode - emergency.service | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.4.3 Ensure authentication required for single user mode - rescue.service | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - limits.conf limits.d | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - sysctl | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - sysctl.conf sysctl.d | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - systemd-coredump ProcessSizeMax | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.1 Ensure core dumps are restricted - systemd-coredump Storage | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.5.2 Ensure XD/NX support is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d | SYSTEM AND INFORMATION INTEGRITY |
1.5.4 Ensure prelink is not installed | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.6.1.1 Ensure SELinux is installed | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.3 Ensure SELinux policy is configured - sestatus | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/config | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.6 Ensure no unconfined services exist | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.8 Ensure the MCS Translation Service (mcstrans) is not installed | CONFIGURATION MANAGEMENT |
1.7.1 Ensure message of the day is configured properly - banner text | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.7.1 Ensure message of the day is configured properly - mrsv | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |