Item Search

NameAudit NamePluginCategory
1.2.2 Verify Red Hat GPG Key is InstalledCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - passwordCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - superusersCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.24 Ensure default SNMP community strings don't existCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

2.2.26 Ensure ldap_tls_cacert is set for LDAP - configCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.26 Ensure ldap_tls_cacert is set for LDAP - fileCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.29 Ensure nosuid option is set for NFSCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.2.31 Ensure noexec option is configured for NFS.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

3.1.1 Ensure IP forwarding is disabled - sysctl net.ipv4.ip_forward = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.1 Ensure IP forwarding is disabled - sysctl net.ipv6.conf.all.forwarding = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.7 Ensure IP tunnels are not configured.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.16 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoersCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.dCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.dCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.7 Enable use of the au-remote pluginCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.8 Enure off-load of audit logs - pathCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.9 Ensure action is taken when audisp-remote buffer is fullCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.10 Ensure off-loaded audit logs are labeled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Ensure permissions on SSH private host key files are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.5 Ensure permissions on SSH public host key files are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.6 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.8 Ensure date and time of last successful logon - showfailedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.8 Ensure date and time of last successful logon - silentCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.11 Ensure system-auth is used when changing passwordsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.10 Ensure delay between logon prompts on failureCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.5.1.7 Ensure password expiration is 60 Day maximum for new usersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.9 Ensure number of concurrent sessions is limitedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.21 Ensure that all files and directories contained in local interactive user home directories are owned by the userCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.23 Ensure local interactive users' dot files for are owned by the user or root.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.27 Ensure nosuid is set on users' home directories.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.29 Ensure users' files and directories within the home directory permissions are 750 or more restrictiveCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.4 Ensure system device files are labeled - device_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.4 Ensure system device files are labeled - unlabeled_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

Red Hat Enterprise Linux 6 is installedCIS Red Hat 6 Server L2 v3.0.0Unix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
Red Hat Enterprise Linux 7 is installedCIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix
Red Hat Enterprise Linux 8 is installedCIS Red Hat EL8 Server L1 v3.0.0Unix
Red Hat Enterprise Linux 8 is installedCIS Red Hat EL8 Server L2 v3.0.0Unix
Red Hat Enterprise Linux 8 is installedCIS Red Hat EL8 Workstation L2 v3.0.0Unix
Red Hat Enterprise Linux 8 is installedCIS Red Hat EL8 Workstation L1 v3.0.0Unix
Red Hat Enterprise Linux 9 is installedCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix
RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY