Item Search

NameAudit NamePluginCategory
1.1.2.1.3 Ensure nosuid option set on /tmp partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.3 Ensure nosuid option set on /var partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.2 Ensure nodev option set on /var/tmp partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.3 Ensure nosuid option set on /var/log/audit partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.4 Ensure nosuid option set on /tmp partitionCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1 Ensure bootloader password is setCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure SELinux is not disabled in bootloader configurationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.4 Ensure all AppArmor Profiles are enforcingCIS SUSE Linux Enterprise 12 v3.1.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.4 Ensure permissions on /etc/motd are configuredCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.1 Ensure at is restricted to authorized usersCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.2 Ensure permissions on SSH private host key files are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.2 Ensure permissions on SSH private host key files are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on all logfiles are configuredCIS SUSE Linux Enterprise 12 v3.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure permissions on all logfiles are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3.7 Ensure access to the su command is restrictedCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.2 Ensure root user umask is configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.3.3 Ensure default user umask is configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure all logfiles have appropriate access configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure permissions on /etc/cron.daily are configuredCIS SUSE Linux Enterprise 12 v3.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.3 Ensure only authorized users own audit log filesCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure only authorized groups are assigned ownership of audit log filesCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3.3 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.3 Ensure permissions on SSH public host key files are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.5 Ensure default user umask is configuredCIS SUSE Linux Enterprise 12 v3.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.7 Ensure access to the su command is restrictedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Ensure permissions on /etc/passwd- are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Ensure permissions on /etc/passwd- are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4 Ensure permissions on /etc/group are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/gshadow- are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/shadow are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/group are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.12 Ensure no unowned or ungrouped files or directories existCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.7 Ensure users own their home directoriesCIS SUSE Linux Enterprise 12 v3.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION