1.1.1.1 Ensure cramfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure freevxfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure hfs kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure hfsplus kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure jffs2 kernel module is not available | CONFIGURATION MANAGEMENT |
1.1.1.9 Ensure unused filesystems kernel modules are not available | CONFIGURATION MANAGEMENT |
1.1.2.1.1 Ensure /tmp is a separate partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.1.2 Ensure nodev option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.2.1.3 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.1.4 Ensure noexec option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.1 Ensure /dev/shm is a separate partition | CONFIGURATION MANAGEMENT |
1.1.2.2.2 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.2.4 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.2 Ensure nodev option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.3 Ensure nosuid option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.2 Ensure nodev option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.3 Ensure nosuid option set on /var partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.2 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.4 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.2 Ensure nodev option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.3 Ensure nosuid option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.4 Ensure noexec option set on /var/log partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition | ACCESS CONTROL, MEDIA PROTECTION |
1.2.1.1 Ensure GPG keys are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1.2 Ensure gpgcheck is globally activated | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1.4 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2.1 Ensure updates, patches, and additional security software are installed | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1.1 Ensure AppArmor is installed | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.2 Ensure AppArmor is enabled in the bootloader configuration | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.3 Ensure all AppArmor Profiles are in enforce or complain mode | ACCESS CONTROL, MEDIA PROTECTION |
1.4.1 Ensure bootloader password is set | ACCESS CONTROL, MEDIA PROTECTION |
1.4.2 Ensure access to bootloader config is configured | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1 Ensure address space layout randomization is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure core dumps are restricted | CONFIGURATION MANAGEMENT |
1.5.3 Ensure prelink is disabled | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.6.1 Ensure crypto-policies-scripts package is installed | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.2 Ensure system wide crypto policy is not set to legacy | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.3 Ensure system wide crypto policy is not set in sshd configuration | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.4 Ensure system wide crypto policy disables sha1 hash and signature support | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.5 Ensure system wide crypto policy disables macs less than 128 bits | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.6 Ensure system wide crypto policy disables cbc for ssh | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.6.7 Ensure system wide crypto policy disables chacha20-poly1305 for ssh | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.7.1 Ensure /etc/motd is configured | ACCESS CONTROL |
1.7.2 Ensure local login warning banner is configured properly | ACCESS CONTROL |
1.7.3 Ensure remote login warning banner is configured properly | ACCESS CONTROL |
1.7.4 Ensure access to /etc/motd is configured | ACCESS CONTROL, MEDIA PROTECTION |