Nov 6, 2024 Functional Update- 6.1.11 Ensure world writable files and directories are secured
- 6.1.12 Ensure no unowned or ungrouped files or directories exist
- 6.1.13 Ensure SUID and SGID files are reviewed
|
Nov 4, 2024 Functional Update- 5.3.2 Ensure filesystem integrity is regularly checked
|
Aug 26, 2024 Functional Update- 4.5.2.4 Ensure root password is set
|
Jul 19, 2024 Functional Update- 4.5.2.3 Ensure system accounts are secured
|
Jun 17, 2024 |
Jun 6, 2024 Functional Update- 1.1.2.1.1 Ensure /tmp is a separate partition
- 3.4.2.1 Ensure nftables base chains exist
- 3.4.2.3 Ensure firewalld drops unnecessary services and ports
- 3.4.2.4 Ensure nftables established connections are configured
- 3.4.2.5 Ensure nftables default deny firewall policy
- 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 4.2.10 Ensure sshd IgnoreRhosts is enabled
- 4.2.11 Ensure sshd KexAlgorithms is configured
- 4.2.12 Ensure sshd LoginGraceTime is configured
- 4.2.13 Ensure sshd LogLevel is configured
- 4.2.14 Ensure sshd MACs are configured
- 4.2.15 Ensure sshd MaxAuthTries is configured
- 4.2.16 Ensure sshd MaxSessions is configured
- 4.2.17 Ensure sshd MaxStartups is configured
- 4.2.18 Ensure sshd PermitEmptyPasswords is disabled
- 4.2.19 Ensure sshd PermitRootLogin is disabled
- 4.2.2 Ensure permissions on SSH private host key files are configured
- 4.2.20 Ensure sshd PermitUserEnvironment is disabled
- 4.2.21 Ensure sshd UsePAM is enabled
- 4.2.22 Ensure sshd crypto_policy is not set
- 4.2.3 Ensure permissions on SSH public host key files are configured
- 4.2.4 Ensure sshd access is configured
- 4.2.5 Ensure sshd Banner is configured
- 4.2.6 Ensure sshd Ciphers are configured
- 4.2.7 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
- 4.2.9 Ensure sshd HostbasedAuthentication is disabled
- 4.4.3.1.1 Ensure password failed attempts lockout is configured
- 4.4.3.1.2 Ensure password unlock time is configured
- 4.4.3.2.1 Ensure password number of changed characters is configured
- 4.4.3.2.2 Ensure password length is configured
- 4.4.3.2.4 Ensure password same consecutive characters is configured
- 4.5.1.2 Ensure password expiration is 365 days or less
- 4.5.1.3 Ensure password expiration warning days is 7 or more
- 4.5.1.4 Ensure inactive password lock is 30 days or less
- 4.5.2.1 Ensure default group for the root account is GID 0
- 5.1.1.6 Ensure rsyslog is configured to send logs to a remote log host
Miscellaneous- Metadata updated.
- References updated.
- Variables updated.
|
Apr 22, 2024 Functional Update- 5.1.1.6 Ensure rsyslog is configured to send logs to a remote log host
|
Apr 1, 2024 Functional Update- 1.6.4 Ensure system wide crypto policy disables macs less than 128 bits
|
Mar 18, 2024 Functional Update- 1.3.1 Ensure bootloader password is set
- 1.3.2 Ensure permissions on bootloader config are configured
- 3.1.2 Ensure wireless interfaces are disabled
- 4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured
- 4.2.2 Ensure permissions on SSH private host key files are configured
- 4.2.3 Ensure permissions on SSH public host key files are configured
- 4.5.3.3 Ensure default user umask is configured
- 5.1.4 Ensure all logfiles have appropriate access configured
- 6.2.11 Ensure local interactive user dot files access is configured
|
Mar 15, 2024 Functional Update- 4.4.3.1.1 Ensure password failed attempts lockout is configured
- 4.4.3.1.2 Ensure password unlock time is configured
- 4.4.3.2.1 Ensure password number of changed characters is configured
- 4.4.3.2.2 Ensure password length is configured
- 4.4.3.2.4 Ensure password same consecutive characters is configured
- 4.4.3.2.5 Ensure password maximum sequential characters is configured
- 4.4.3.3.1 Ensure password history remember is configured
|