Item Search

NameAudit NamePluginCategory
1.1.23 Disable Mounting of squashfs Filesystems - install squashfs /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.24 Disable Mounting of udf Filesystems - modprobeCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.2.5 Disable yum-updatesdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Install AIDECIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

1.4.1 Enable SELinux in /etc/grub.conf - selinux != 0CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.4 Remove SETroubleshootCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

4.2.3 Disable Secure ICMP Redirect Acceptance - net.ipv4.conf.all.secure_redirects = 0CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.1.3 Keep All Auditing InformationCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.5 Record Events That Modify Date and Time Information - clock_settimeCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.6 Record Events That Modify User/Group Information - /etc/gshadowCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - /etc/sysconfig/networkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.9 Collect Login and Logout Events - /var/log/btmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.10 Collect Session Initiation Information - /var/log/wtmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.10 Collect Session Initiation Information - /var/run/utmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.11 Collect Discretionary Access Control Permission Modification Events - arch=b64 fchmodatCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.11 Collect Discretionary Access Control Permission Modification Events - arch=b64 fchownatCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.11 Collect Discretionary Access Control Permission Modification Events - arch=b64 fsetxattrCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.16 Collect Changes to System Administration Scope (sudoers)CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.18 Collect Kernel Module Loading and Unloading - /sbin/insmodCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.1.1 Enable anacron DaemonCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.9 Set SSH PermitEmptyPasswords to NoCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

6.3.3 Use pam_deny.so to Deny Services - auth requisite pam_deny.so /etc/pam.d/*CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.5 Restrict Access to the su Command - wheel:x:10:root, <user list>'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.1.3 Set Password Expiring Warning Days - PASS_WARN_AGE >= 7CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

9.1.8 Verify User/Group Ownership on /etc/gshadowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.9 Verify User/Group Ownership on /etc/groupCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.12 Find Un-grouped Files and DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.4 Verify No Legacy '+' Entries Exist in /etc/group File - + Entries Exist in /etc/group FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.2.5 Verify No UID 0 Accounts Exist Other Than rootCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.9 Check Permissions on User .netrc FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.11 Check Groups in /etc/passwdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.16 Check That Reserved UIDs Are Assigned to System AccountsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.19 Check for Presence of User .netrc FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411045 - All RHEL 9 interactive users must have a primary group that exists.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411085 - RHEL 9 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-411105 - RHEL 9 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-412050 - RHEL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-412060 - RHEL 9 must define default permissions for the c shell.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-431010 - RHEL 9 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431025 - RHEL 9 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-432010 - RHEL 9 must have the sudo package installed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-432025 - RHEL 9 must require users to reauthenticate for privilege escalation.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-432035 - RHEL 9 must restrict the use of the 'su' command - su command.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

RHEL-09-433015 - RHEL 9 fapolicy module must be enabled.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-611010 - RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611040 - RHEL 9 must ensure the password complexity module is enabled in the password-auth file.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611045 - RHEL 9 must ensure the password complexity module is enabled in the system-auth file.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-611080 - RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611115 - RHEL 9 must require the change of at least eight characters when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611125 - RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION