CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation

Audit Details

Name: CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation

Updated: 11/6/2024

Authority: CIS

Plugin: Unix

Revision: 1.26

Estimated Item Count: 316

File Details

Filename: CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Workstation.audit

Size: 1.15 MB

MD5: 5d045b11ae81d2fbffb63dc23b5ad1b9
SHA256: 58d2e7bc4b5ff371b5349304bf565592ae0b7217b278525d52a6b141ac784a93

Audit Changelog

 
Revision 1.26

Nov 6, 2024

Functional Update
  • 1.1.25 Ensure sticky bit is set on all world-writable directories
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • References updated.
Revision 1.25

Jun 17, 2024

Miscellaneous
  • Metadata updated.
Revision 1.24

Feb 12, 2024

Functional Update
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • Metadata updated.
Revision 1.23

Dec 15, 2023

Functional Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Informational Update
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.22

Oct 27, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Revision 1.21

Oct 3, 2023

Functional Update
  • 1.8.3 Ensure last logged in user display is disabled - disable user list
Informational Update
  • 5.5.5 Ensure default user umask is configured - system wide default
  • 5.5.5 Ensure default user umask is configured - system wide umask
Revision 1.20

Sep 19, 2023

Functional Update
  • 1.1.25 Ensure sticky bit is set on all world-writable directories
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
  • 4.2.4 Ensure permissions on all logfiles are configured
  • 5.3.4 Ensure permissions on SSH private host key files are configured
  • 6.1.10 Ensure no world writable files exist
  • 6.1.11 Ensure no unowned files or directories exist
  • 6.1.12 Ensure no ungrouped files or directories exist
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
Miscellaneous
  • Metadata updated.
  • References updated.
  • Variables updated.
Revision 1.19

Aug 8, 2023

Functional Update
  • 2.2.13 Ensure net-snmp is not installed
Revision 1.18

Jul 24, 2023

Functional Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Informational Update
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 4.2.1.2 Ensure rsyslog service is enabled
  • 4.2.1.2 Ensure rsyslog service is enabled and running
  • 4.2.1.3 Ensure rsyslog default file permissions are configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts
Removed
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - enabled
  • 4.2.1.2 Ensure rsyslog Service is enabled and running - running
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - imtcp.so
Revision 1.17

Jul 20, 2023

Functional Update
  • 5.5.1.1 Ensure password expiration is 365 days or less - users
  • 5.5.1.3 Ensure password expiration warning days is 7 or more - users
  • 5.5.1.4 Ensure inactive password lock is 30 days or less - users
  • 6.1.13 Audit SUID executables
  • 6.1.14 Audit SGID executables
  • 6.2.10 Ensure root PATH Integrity
  • 6.2.11 Ensure all users' home directories exist
  • 6.2.12 Ensure users own their home directories
  • 6.2.13 Ensure users' home directories permissions are 750 or more restrictive