1.1.1.1 Ensure mounting of cramfs filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.1 Ensure mounting of cramfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.2 Ensure mounting of freevxfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.4 Ensure mounting of hfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of squashfs filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of squashfs filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.6 Ensure mounting of squashfs filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.1.7 Ensure mounting of udf filesystems is disabled - /etc/modprobe.d/* | CONFIGURATION MANAGEMENT |
1.1.1.7 Ensure mounting of udf filesystems is disabled - lsmod | CONFIGURATION MANAGEMENT |
1.1.1.7 Ensure mounting of udf filesystems is disabled - modprobe | CONFIGURATION MANAGEMENT |
1.1.3 Ensure nodev option set on /tmp partition | ACCESS CONTROL |
1.1.4 Ensure nosuid option set on /tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5 Ensure noexec option set on /tmp partition | CONFIGURATION MANAGEMENT |
1.1.8 Ensure nodev option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.9 Ensure nosuid option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.10 Ensure noexec option set on /var/tmp partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.14 Ensure nodev option set on /home partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.15 Ensure nodev option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.16 Ensure nosuid option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.17 Ensure noexec option set on /dev/shm partition | ACCESS CONTROL, MEDIA PROTECTION |
1.1.18 Ensure nodev option set on removable media partitions | ACCESS CONTROL, MEDIA PROTECTION |
1.1.19 Ensure nosuid option set on removable media partitions | ACCESS CONTROL, MEDIA PROTECTION |
1.1.20 Ensure noexec option set on removable media partitions | ACCESS CONTROL, MEDIA PROTECTION |
1.1.21 Ensure sticky bit is set on all world-writable directories | ACCESS CONTROL, MEDIA PROTECTION |
1.2.1 Ensure package manager repositories are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure AIDE is installed | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.3.2 Ensure filesystem integrity is regularly checked | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.4.1 Ensure permissions on bootloader config are configured | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - password_pbkdf2 | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - superusers | SYSTEM AND INFORMATION INTEGRITY |
1.4.3 Ensure authentication required for single user mode | ACCESS CONTROL |
1.5.1 Ensure core dumps are restricted - /etc/sysctl | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.5.1 Ensure core dumps are restricted - fs.suid_dumpable | ACCESS CONTROL |
1.5.1 Ensure core dumps are restricted - hard core 0 | ACCESS CONTROL |
1.5.2 Ensure XD/NX support is enabled | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctl | SYSTEM AND INFORMATION INTEGRITY |
1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl | SYSTEM AND INFORMATION INTEGRITY |
1.5.4 Ensure prelink is disabled | AUDIT AND ACCOUNTABILITY |