Item Search

NameAudit NamePluginCategory
/etc/audit/rules.d/*.rulesDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
/etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
/etc/profileDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
1.1.21 Disable Mounting of hfs Filesystems - install hfs /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.24 Disable Mounting of udf Filesystems - lsmodCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.3 Remove X Windows - /etc/inittab- id:3:initdefault:CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.4 Disable Print Server - CUPSCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - nfslockCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - portmapCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.16 Configure Mail Transfer Agent for Local-Only Mode - O DaemonPortOptions=Port=smtp, Addr=127.0.0.1, Name=MTACIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.2 Disable ICMP Redirect Acceptance - net.ipv4.conf.default.accept_redirects = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.3 Disable Secure ICMP Redirect Acceptance - net.ipv4.conf.default.secure_redirects = 0CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

4.2.4 Log Suspicious Packets - net.ipv4.conf.all.log_martians = 1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.7 Enable RFC-recommended Source Route Validation - net.ipv4.conf.all.rp_filter = 1CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

4.2.7 Enable RFC-recommended Source Route Validation - net.ipv4.conf.default.rp_filter = 1CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

4.5.4 Create /etc/hosts.denyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6.3 Disable RDSCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.1.1 Configure /etc/syslog.conf - auth,userCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.1 Configure /etc/syslog.conf - unusedCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/daemon.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/unused.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/syslogCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.5 Configure rsyslog to Send Logs to a Remote Log Host - *.* @@loghost.example.comCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.6 Accept Remote rsyslog Messages Only on Designated Log Hosts - $ModLoad imtcp.soCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.1.2 Disable System on Audit Log Full - admin_space_left_actionCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.2 Enable auditd ServiceCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.4 Enable Auditing for Processes That Start Prior to auditdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.6 Record Events That Modify User/Group Information - /etc/passwdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.6 Record Events That Modify User/Group Information - /etc/shadowCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - arch=b64 -S sethostnameCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.18 Collect Kernel Module Loading and Unloading - /sbin/rmmodCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.1.10 Restrict at/cron to Authorized Users - at.allowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.3 Set Permissions on /etc/ssh/sshd_configCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.5 Set SSH MaxAuthTries to 4 or LessCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.13 Limit Access via SSH - AllowUsers/Groups, DenyUsers/GroupsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.3.3 Use pam_deny.so to Deny Services - auth requisite pam_deny.so /etc/pam.d/sshdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.1.1 Set Password Expiration Days - 1-90CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.4 Set Default umask for UsersCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

8.1.1 Set Warning Banner for Standard Login Services - /etc/issue.net permsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.10 Find World Writable FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.14 Find SGID System ExecutablesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.12 Check That Users Are Assigned Valid Home DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.13 Check User Home Directory OwnershipCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.14 Check for Duplicate UIDsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

Check for dnsDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Check for GDM/GnomeDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Check for host USB capabilitiesDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Check for NFS mounted dirsDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Check for NXDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
v1 enabledCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix