Item Search

NameAudit NamePluginCategory
3.1.3 Ensure bluetooth services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.3.6 Ensure secure icmp redirects are not acceptedCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure reverse path filtering is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.4.2.2 Ensure firewalld service enabled and runningCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.5 Ensure nftables loopback traffic is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.7 Ensure nftables default deny firewall policyCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.3 Ensure iptables rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.5 Ensure iptables rules are savedCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.6 Ensure iptables service is enabled and activeCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.3.3 Ensure ip6tables firewall rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1.2 Ensure permissions on /etc/crontab are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.7 Ensure permissions on /etc/cron.d are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.11 Ensure sshd IgnoreRhosts is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.2.13 Ensure sshd LoginGraceTime is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.20 Ensure sshd PermitRootLogin is disabledCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.22 Ensure sshd UsePAM is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.4.2.2.6 Ensure password maximum sequential characters is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.4.2.4.3 Ensure pam_unix includes a strong password hashing algorithmCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.5.1.1 Ensure strong password hashing algorithm is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.2.1.1 Ensure systemd-journal-remote is installedCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.1.4 Ensure journald is not configured to receive logs from a remote clientCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

5.1.2.2 Ensure journald service is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.3 Ensure journald is configured to compress large log filesCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.6 Ensure journald log rotation is configured per site policyCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.3 Ensure logrotate is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

6.2.6 Ensure no duplicate user names existCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.8 Ensure root path integrityCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

at is installedCIS Amazon Linux 2 v3.0.0 L1Unix
autofs.service enabledCIS Amazon Linux 2 v3.0.0 L1Unix
banner textCIS Amazon Linux 2 v3.0.0 L1Unix
Chain INPUTCIS Amazon Linux 2 v3.0.0 L1Unix
Check for systemd-journal-remote packageCIS Amazon Linux 2 v3.0.0 L1Unix
Check if cron is installedCIS Amazon Linux 2 v3.0.0 L1Unix
ClientAliveInterval is greater than 0CIS Amazon Linux 2 v3.0.0 L1Unix
Ensure at least one file named /etc/pam.d/password-auth exists and matches password patternCIS Amazon Linux 2 v3.0.0 L1Unix
Ensure at least one file named /etc/pam.d/system-auth exists and matches patternCIS Amazon Linux 2 v3.0.0 L1Unix
Ensure at least one file named /etc/pam.d/system-auth exists and matches pattern (?i)^h*passwordh+(requisite|required)h+pam_pwhistory.soCIS Amazon Linux 2 v3.0.0 L1Unix
Ensure at least one file named /etc/pam.d/system-auth exists and matches pattern ^h*authh+(required|requisite)h+([^#CIS Amazon Linux 2 v3.0.0 L1Unix
Ensure no file named /etc/pam.d/password-auth pam_unix.so contains rememberCIS Amazon Linux 2 v3.0.0 L1Unix
Ensure no file named /etc/pam.d/system-auth exists and matches patternCIS Amazon Linux 2 v3.0.0 L1Unix
Ensure no file named /etc/pam.d/system-auth pam_unix.so contains rememberCIS Amazon Linux 2 v3.0.0 L1Unix
Global configuration is set correctlyCIS Amazon Linux 2 v3.0.0 L1Unix
INPUT dropCIS Amazon Linux 2 v3.0.0 L1Unix
Nftables check - activeCIS Amazon Linux 2 v3.0.0 L1Unix
Old format ModLoad imtcpCIS Amazon Linux 2 v3.0.0 L1Unix