CIS Red Hat EL8 Workstation L1 v1.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Red Hat EL8 Workstation L1 v1.0.0

Updated: 7/14/2021

Authority: CIS

Plugin: Unix

Revision: 1.24

Estimated Item Count: 282

Audit Changelog

Ā 
Revision 1.24

Jul 14, 2021

Functional Update
  • 1.1.10 Ensure noexec option set on /var/tmp partition
  • 1.1.14 Ensure nodev option set on /home partition
  • 1.1.15 Ensure nodev option set on /dev/shm partition
  • 1.1.16 Ensure nosuid option set on /dev/shm partition
  • 1.1.17 Ensure noexec option set on /dev/shm partition
  • 1.1.3 Ensure nodev option set on /tmp partition
  • 1.1.4 Ensure nosuid option set on /tmp partition
  • 1.1.5 Ensure noexec option set on /tmp partition
  • 1.1.8 Ensure nodev option set on /var/tmp partition
  • 1.1.9 Ensure nosuid option set on /var/tmp partition
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Revision 1.23

Jul 2, 2021

Functional Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.22

Jun 17, 2021

Functional Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • Metadata updated.
  • References updated.
Revision 1.21

Jun 9, 2021

Functional Update
  • 1.4.2 Ensure filesystem integrity is regularly checked
  • 1.9 Ensure updates, patches, and additional security software are installed
  • 2.2.1.1 Ensure time synchronization is in use
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 5.2.19 Ensure SSH MaxSessions is set to 4 or less
  • 5.7 Ensure access to the su command is restricted - wheel group contains root
  • 6.2.7 Ensure users' home directories permissions are 750 or more restrictive
  • 6.2.8 Ensure users own their home directories
  • 6.2.9 Ensure users' dot files are not group or world writable
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • 1.1.2 Ensure /tmp is configured - config check
  • 3.1.1 Ensure IP forwarding is disabled - ipv4 /etc/sysctl.conf /etc/sysctl.d/*
  • 3.1.1 Ensure IP forwarding is disabled - ipv4 sysctl
  • 3.1.1 Ensure IP forwarding is disabled - ipv6 /etc/sysctl.conf /etc/sysctl.d/*
  • 3.1.1 Ensure IP forwarding is disabled - ipv6 sysctl
Removed
  • 1.1.2 Ensure /tmp is configured - systemctl
  • 3.1.1 Ensure IP forwarding is disabled - /etc/sysctl.conf /etc/sysctl.d/*
  • 3.1.1 Ensure IP forwarding is disabled - sysctl
Revision 1.20

Feb 16, 2021

Functional Update
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain FORWARD
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain INPUT
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain OUTPUT
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 5.5.5 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • Metadata updated.
  • References updated.
Added
  • 1.6.1 Ensure core dumps are restricted - systemctl coredump.service - ProcessSizeMax
  • 1.6.1 Ensure core dumps are restricted - systemctl coredump.service - Storage
Revision 1.19

Oct 20, 2020

Functional Update
  • 1.1.18 Ensure nodev option set on removable media partitions
  • 3.4.2.1 Ensure firewalld service is enabled and running - enabled
  • 3.4.2.1 Ensure firewalld service is enabled and running - running
  • 3.4.2.2 Ensure iptables is not enabled - disabled
  • 3.4.2.2 Ensure iptables is not enabled - inactive
  • 3.4.2.3 Ensure nftables is not enabled - disabled
  • 3.4.2.3 Ensure nftables is not enabled - inactive
  • 3.4.2.4 Ensure default zone is set
  • 3.4.2.5 Ensure network interfaces are assigned to appropriate zone
  • 3.4.2.6 Ensure unnecessary services and ports are not accepted
  • 3.4.3.1 Ensure iptables are flushed - ipv4
  • 3.4.3.1 Ensure iptables are flushed - ipv6
  • 3.4.3.2 Ensure a table exists
  • 3.4.3.3 Ensure base chains exist - 'hook forward'
  • 3.4.3.3 Ensure base chains exist - 'hook input'
  • 3.4.3.3 Ensure base chains exist - 'hook output'
  • 3.4.3.4 Ensure loopback traffic is configured
  • 3.4.3.4 Ensure loopback traffic is configured - iif lo accept
  • 3.4.3.4 Ensure loopback traffic is configured - ip saddr
  • 3.4.3.4 Ensure loopback traffic is configured - ip6 saddr
  • 3.4.3.6 Ensure default deny firewall policy - Chain FORWARD
  • 3.4.3.6 Ensure default deny firewall policy - Chain INPUT
  • 3.4.3.6 Ensure default deny firewall policy - Chain OUTPUT
  • 3.4.3.7 Ensure nftables service is enabled
  • 3.4.3.8 Ensure nftables rules are permanent
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain FORWARD
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain INPUT
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain OUTPUT
  • 3.4.4.1.2 Ensure loopback traffic is configured - Input accept all lo
  • 3.4.4.1.2 Ensure loopback traffic is configured - Input drop all
  • 3.4.4.1.2 Ensure loopback traffic is configured - Output accept all lo
  • 3.4.4.1.3 Ensure outbound and established connections are configured
  • 3.4.4.1.4 Ensure firewall rules exist for all open ports
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain FORWARD'
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain INPUT'
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain OUTPUT'
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 5.5.3 Ensure default user shell timeout is 900 seconds or less - bashrc
  • 6.2.7 Ensure users' home directories permissions are 750 or more restrictive
  • 6.2.8 Ensure users own their home directories
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Added
  • 3.4.3.5 Ensure outbound and established connections are configured - incoming, established
  • 3.4.3.5 Ensure outbound and established connections are configured - outgoing, established
Removed
  • 3.4.3.5 Ensure outbound and established connections are configured
Revision 1.18

Oct 14, 2020

Functional Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 4.2.3 Ensure permissions on all logfiles are configured
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Revision 1.17

Oct 5, 2020

Functional Update
  • 1.4.2 Ensure filesystem integrity is regularly checked
  • 1.5.1 Ensure permissions on bootloader config are configured - grub.cfg
  • 1.5.1 Ensure permissions on bootloader config are configured - grubenv
  • 1.5.2 Ensure bootloader password is set
  • 1.8.2 Ensure GDM login banner is configured - banner message enabled
  • 1.8.2 Ensure GDM login banner is configured - banner message text
  • 2.2.1.1 Ensure time synchronization is in use
  • 2.2.1.2 Ensure chrony is configured - NTP server
  • 2.2.1.2 Ensure chrony is configured - user
  • 2.2.18 Ensure mail transfer agent is configured for local-only mode
  • 3.4.1.1 Ensure a Firewall package is installed
  • 3.4.2.1 Ensure firewalld service is enabled and running - enabled
  • 3.4.2.1 Ensure firewalld service is enabled and running - running
  • 3.4.2.2 Ensure iptables is not enabled - disabled
  • 3.4.2.2 Ensure iptables is not enabled - inactive
  • 3.4.2.3 Ensure nftables is not enabled - disabled
  • 3.4.2.3 Ensure nftables is not enabled - inactive
  • 3.4.2.4 Ensure default zone is set
  • 3.4.2.5 Ensure network interfaces are assigned to appropriate zone
  • 3.4.2.6 Ensure unnecessary services and ports are not accepted
  • 3.4.3.1 Ensure iptables are flushed - ipv4
  • 3.4.3.1 Ensure iptables are flushed - ipv6
  • 3.4.3.2 Ensure a table exists
  • 3.4.3.3 Ensure base chains exist - 'hook forward'
  • 3.4.3.3 Ensure base chains exist - 'hook input'
  • 3.4.3.3 Ensure base chains exist - 'hook output'
  • 3.4.3.4 Ensure loopback traffic is configured
  • 3.4.3.4 Ensure loopback traffic is configured - iif lo accept
  • 3.4.3.4 Ensure loopback traffic is configured - ip saddr
  • 3.4.3.4 Ensure loopback traffic is configured - ip6 saddr
  • 3.4.3.5 Ensure outbound and established connections are configured
  • 3.4.3.6 Ensure default deny firewall policy - Chain FORWARD
  • 3.4.3.6 Ensure default deny firewall policy - Chain INPUT
  • 3.4.3.6 Ensure default deny firewall policy - Chain OUTPUT
  • 3.4.3.7 Ensure nftables service is enabled
  • 3.4.3.8 Ensure nftables rules are permanent
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain FORWARD
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain INPUT
  • 3.4.4.1.1 Ensure default deny firewall policy - Chain OUTPUT
  • 3.4.4.1.2 Ensure loopback traffic is configured - Input accept all lo
  • 3.4.4.1.2 Ensure loopback traffic is configured - Input drop all
  • 3.4.4.1.2 Ensure loopback traffic is configured - Output accept all lo
  • 3.4.4.1.3 Ensure outbound and established connections are configured
  • 3.4.4.1.4 Ensure firewall rules exist for all open ports
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain FORWARD'
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain INPUT'
  • 3.4.4.2.1 Ensure IPv6 default deny firewall policy - 'Chain OUTPUT'
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.1 Ensure rsyslog is installed
  • 4.2.1.2 Ensure rsyslog Service is enabled
  • 4.2.1.3 Ensure rsyslog default file permissions configured
  • 4.2.1.4 Ensure logging is configured
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 4.2.2.1 Ensure journald is configured to send logs to rsyslog
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • Platform check updated.
Revision 1.16

Sep 29, 2020

Functional Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
Miscellaneous
  • References updated.
Revision 1.15

Aug 25, 2020

Functional Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp
  • 5.5.1.1 Ensure password expiration is 365 days or less - users
Informational Update
  • 3.4.4.2.2 Ensure IPv6 loopback traffic is configured
  • 3.4.4.2.3 Ensure IPv6 outbound and established connections are configured
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - firewall rules
  • 3.4.4.2.4 Ensure IPv6 firewall rules exist for all open ports - ports
  • 4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun
  • 4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts. - ModLoad imtcp