CIS SUSE Linux Enterprise 15 Server L1 v1.0.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS SUSE Linux Enterprise 15 Server L1 v1.0.0

Updated: 3/22/2022

Authority: CIS

Plugin: Unix

Revision: 1.7

Estimated Item Count: 296

File Details

Filename: CIS_SUSE_Linux_Enterprise_15_Server_v1.0.0_L1.audit

Size: 710 kB

MD5: cd00e401f7b30bb2e0013257f2f58663
SHA256: 363538663b40a97f2b939a2febd0d5e966b93bed5267a3b0c92c52e3747cfa67

Audit Items

DescriptionCategories
1.1.1.2 Ensure mounting of udf filesystems is disabled

CONFIGURATION MANAGEMENT

1.1.2 Ensure /tmp is configured

CONFIGURATION MANAGEMENT

1.1.3 Ensure noexec option set on /tmp partition

ACCESS CONTROL

1.1.4 Ensure nodev option set on /tmp partition

ACCESS CONTROL

1.1.5 Ensure nosuid option set on /tmp partition

ACCESS CONTROL

1.1.6 Ensure /dev/shm is configured - fstab

CONFIGURATION MANAGEMENT

1.1.6 Ensure /dev/shm is configured - mount

CONFIGURATION MANAGEMENT

1.1.7 Ensure noexec option set on /dev/shm partition

ACCESS CONTROL

1.1.8 Ensure nodev option set on /dev/shm partition

ACCESS CONTROL

1.1.9 Ensure nosuid option set on /dev/shm partition

ACCESS CONTROL

1.1.12 Ensure noexec option set on /var/tmp partition

ACCESS CONTROL

1.1.13 Ensure nodev option set on /var/tmp partition

ACCESS CONTROL

1.1.14 Ensure nosuid option set on /var/tmp partition

ACCESS CONTROL

1.1.18 Ensure nodev option set on /home partition

ACCESS CONTROL

1.1.19 Ensure noexec option set on removable media partitions

ACCESS CONTROL

1.1.20 Ensure nodev option set on removable media partitions

ACCESS CONTROL

1.1.21 Ensure nosuid option set on removable media partitions

ACCESS CONTROL

1.1.22 Ensure sticky bit is set on all world-writable directories

ACCESS CONTROL

1.1.23 Disable Automounting
1.2.1 Ensure GPG keys are configured

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure package manager repositories are configured

SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activated

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure sudo is installed

CONFIGURATION MANAGEMENT

1.3.2 Ensure sudo commands use pty

ACCESS CONTROL

1.3.3 Ensure sudo log file exists

AUDIT AND ACCOUNTABILITY

1.4.1 Ensure AIDE is installed

CONFIGURATION MANAGEMENT

1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.service
1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.timer
1.4.2 Ensure filesystem integrity is regularly checked - cron

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure bootloader password is set - password

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure bootloader password is set - superusers

SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure permissions on bootloader config are configured

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure authentication required for single user mode - rescue.emergency

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure authentication required for single user mode - rescue.service

SYSTEM AND INFORMATION INTEGRITY

1.6.1 Ensure core dumps are restricted - fs.suid_dumpable sysctl.conf

ACCESS CONTROL

1.6.1 Ensure core dumps are restricted - limits.conf

ACCESS CONTROL

1.6.1 Ensure core dumps are restricted - sysctl fs.suid_dumpable

ACCESS CONTROL

1.6.1 Ensure core dumps are restricted - systemd-coredump ProcessSizeMax

ACCESS CONTROL

1.6.1 Ensure core dumps are restricted - systemd-coredump Storage

ACCESS CONTROL

1.6.2 Ensure XD/NX support is enabled

SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure address space layout randomization (ASLR) is enabled - sysctl

SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf

SYSTEM AND INFORMATION INTEGRITY

1.6.4 Ensure prelink is disabled

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure AppArmor is installed - apparmor-docs

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure AppArmor is installed - apparmor-parser

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure AppArmor is installed - apparmor-profiles

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure AppArmor is installed - apparmor-utils

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure AppArmor is installed - libapparmor1

CONFIGURATION MANAGEMENT

1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1

SYSTEM AND INFORMATION INTEGRITY

1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - security=apparmor

SYSTEM AND INFORMATION INTEGRITY