Item Search

NameAudit NamePluginCategory
1.1.19 Disable Mounting of freevxfs Filesystems - install freevxfs /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.20 Disable Mounting of jffs2 Filesystems - install jffs2 /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.3.2 Implement Periodic Execution of File Integrity - 0 5 * * * /usr/sbin/aide --check'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

1.4.2 Set the SELinux State - SELINUX=enforcingCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.3 Set the SELinux Policy - SELINUXTYPE=targetedCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.6 Check for Unconfined DaemonsCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.1.1 Configure Audit Log Storage SizeCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.1.2 Disable System on Audit Log Full - space_left_actionCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.5 Record Events That Modify Date and Time Information - adjtimexCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - /etc/hostsCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - arch=b32 -S sethostnameCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.8 Record Events That Modify the System's Mandatory Access Controls - /etc/selinux/CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.9 Collect Login and Logout Events - /var/log/lastlogCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.9 Collect Login and Logout Events - /var/log/tallylogCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.11 Collect Discretionary Access Control Permission Modification Events - arch=b32 fchmodatCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.11 Collect Discretionary Access Control Permission Modification Events - arch=b32 fsetxattrCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.12 Collect Unsuccessful Unauthorized Access Attempts to Files - arch=b32 EACCESCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.12 Collect Unsuccessful Unauthorized Access Attempts to Files - arch=b32 EPERMCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.12 Collect Unsuccessful Unauthorized Access Attempts to Files - arch=b64 EACCESCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.15 Collect File Deletion Events by User - arch=b64CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.17 Collect System Administrator Actions (sudolog)CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.1.7 Set User/Group Owner and Permission on /etc/cron.weeklyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.10 Restrict at/cron to Authorized Users - at.denyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.3 Set Default Group for root AccountCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

8.1.2 Remove OS Information from Login Warning Banners - /etc/issue.netCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

8.1.2 Remove OS Information from Login Warning Banners - /etc/motdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.1.4 Verify Permissions on /etc/gshadowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.2 Verify No Legacy '+' Entries Exist in /etc/passwd File - + Entries Exist in /etc/passwd FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

9.2.3 Verify No Legacy '+' Entries Exist in /etc/shadow File - + Entries Exist in /etc/shadow FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.2.6 Ensure root PATH IntegrityCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.7 Check Permissions on User Home DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.15 Check for Duplicate GIDsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

9.2.17 Check for Duplicate User NamesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.20 Check for Presence of User .forward FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

RHEL-08-010020 - RHEL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-010161 - RHEL 8 must prevent system daemons from using Kerberos for authentication.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010200 - RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010230 - The RHEL 8 /var/log/messages file must be group-owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010260 - The RHEL 8 /var/log directory must be group-owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010293 - The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-010296 - RHEL 8 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-010331 - RHEL 8 library directories must have mode 755 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010371 - RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010384 - RHEL 8 must require re-authentication when using the "sudo" command.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010400 - RHEL 8 must implement certificate status checking for multifactor authentication.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010522 - The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010570 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010590 - RHEL 8 must prevent code from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT