2.2.2 Ensure avahi daemon services are not in use | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.2.5 Ensure dnsmasq services are not in use | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.2.14 Ensure snmp services are not in use | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.2.15 Ensure telnet server services are not in use | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.2.16 Ensure tftp server services are not in use | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.2.22 Ensure only approved services are listening on a network interface | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.3.4 Ensure telnet client is not installed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
3.1.1 Ensure IPv6 status is identified | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
3.1.2 Ensure wireless interfaces are disabled | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
3.3.9 Ensure suspicious packets are logged | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
3.4.3.3 Ensure an nftables table exists | CIS Amazon Linux 2 v3.0.0 L1 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.3.6 Ensure nftables outbound and established connections are configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.3.9 Ensure nftables rules are permanent | CIS Amazon Linux 2 v3.0.0 L1 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.4.3.4 Ensure ip6tables default deny firewall policy | CIS Amazon Linux 2 v3.0.0 L1 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.4.3.5 Ensure ip6tables rules are saved | CIS Amazon Linux 2 v3.0.0 L1 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1.2.1 Ensure at is restricted to authorized users | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.5 Ensure sshd Banner is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.2.7 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.2.12 Ensure sshd KexAlgorithms is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.19 Ensure sshd PermitEmptyPasswords is disabled | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.3.5 Ensure re-authentication for privilege escalation is not disabled globally | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.4.1.2 Ensure libpwquality is installed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.2.3.2 Ensure password history remember is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.2.3.3 Ensure password history is enforced for the root user | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.2.4.2 Ensure pam_unix does not include remember | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.2.1 Ensure default group for the root account is GID 0 | CIS Amazon Linux 2 v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.5.2.4 Ensure root password is set | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.1.1 Ensure rsyslog is installed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
5.1.1.3 Ensure journald is configured to send logs to rsyslog | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
5.1.1.4 Ensure rsyslog default file permissions are configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.1.1.6 Ensure rsyslog is configured to send logs to a remote log host | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
5.1.2.1.3 Ensure systemd-journal-remote is enabled | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
5.1.2.4 Ensure journald is configured to write logfiles to persistent disk | CIS Amazon Linux 2 v3.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
6.1.9 Ensure permissions on /etc/shells are configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.11 Ensure world writable files and directories are secured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.12 Ensure no unowned or ungrouped files or directories exist | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.13 Ensure SUID and SGID files are reviewed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.4 Ensure no duplicate UIDs exist | CIS Amazon Linux 2 v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.9 Ensure root is the only UID 0 account | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
check if firewalld is not active | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
Check rsync installed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
config file maxauthtries setting | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
Ensure at least one file named /etc/pam.d/password-auth exists and matches pattern (?i)^h*passwordh+(requisite|required)h+pam_pwhistory.so | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
Ensure at least one file named /etc/pam.d/system-auth exists and matches password pattern | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
INPUT accept | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
Loopback on Port 587 | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
New format input imtcp | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
On disk timestamp_timeout | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
URL | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |