Verify and Correct File Permissions with RPM
Verify and Correct Ownership with RPM
Install the Host Intrusion Prevention System (HIPS) Module
Install Intrusion Detection Software
Install the Asset Configuration Compliance Module (ACCM)
Install the Policy Auditor (PA) Module
Require Authentication for Emergency Systemd Target
Disable the GNOME3 Login Restart and Shutdown Buttons
Require Authentication for Single User Mode
Set Account Expiration Following Inactivity
Disable All GNOME3 Thumbnailers
Prevent Login to Accounts With Empty Password
Verify No netrc Files Exist
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
Verify Only Root Has UID 0
Ensure that System Accounts Do Not Run a Shell Upon Login
Restrict Serial Port Root Logins
Restrict Virtual Console Root Logins
Ensure that User Home Directories are not Group-Writable or World-Readable
Make the auditd Configuration Immutable
Ensure auditd Collects System Administrator Actions
Record Events that Modify User/Group Information
System Audit Logs Must Have Mode 0750 or Less Permissive
System Audit Logs Must Be Owned By Root
Disable Ctrl-Alt-Del Burst Action
Disable Ctrl-Alt-Del Reboot Activation
Verify that Interactive Boot is Disabled
Assign Expiration Date to Emergency Accounts
Assign Expiration Date to Temporary Accounts
Set existing passwords a period of inactivity before they been locked
Verify /boot/grub2/grub.cfg Group Ownership
Verify /boot/grub2/grub.cfg User Ownership
Verify /boot/grub2/grub.cfg Permissions
Set Boot Loader Password in grub2
Verify the UEFI Boot Loader grub.cfg Group Ownership
Verify the UEFI Boot Loader grub.cfg User Ownership
Verify the UEFI Boot Loader grub.cfg Permissions
Set the UEFI Boot Loader Password
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Ensure Log Files Are Owned By Appropriate Group
Record Events that Modify User/Group Information - /etc/security/opasswd
Ensure Log Files Are Owned By Appropriate User
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
System Audit Logs Must Have Mode 0640 or Less Permissive
Verify ip6tables Enabled if Using IPv6
Set Default ip6tables Policy for Incoming Packets
Set Default iptables Policy for Incoming Packets
Set Default iptables Policy for Forwarded Packets
Disable IPv6 Networking Support Automatic Loading
Disable IPv6 Addressing on All IPv6 Interfaces
Disable IPv6 Addressing on IPv6 Interfaces by Default
Configure Accepting Router Advertisements on All IPv6 Interfaces
Disable Accepting ICMP Redirects for All IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces
Disable Kernel Parameter for IPv6 Forwarding
Disable Accepting Router Advertisements on all IPv6 Interfaces by Default
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default
Disable Accepting ICMP Redirects for All IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces
Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default
Enable Kernel Paremeter to Log Martian Packets on all IPv4 Interfaces by Default
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default
Configure Kernel Parameter for Accepting Secure Redirects By Default
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces
Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces
Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default
Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces
Deactivate Wireless Network Interfaces
Verify that All World-Writable Directories Have Sticky Bits Set
Ensure All SGID Executables Are Authorized
Ensure All SUID Executables Are Authorized
Ensure No World-Writable Files Exist
Ensure All Files Are Owned by a Group
Verify Group Who Owns group File
Verify Group Who Owns gshadow File
Verify Group Who Owns passwd File
Verify Group Who Owns shadow File
Verify User Who Owns group File
Verify User Who Owns gshadow File
Verify User Who Owns passwd File
Verify User Who Owns shadow File
Verify Permissions on group File
Verify Permissions on gshadow File
Verify Permissions on passwd File
Verify Permissions on shadow File
Verify that System Executables Have Root Ownership
Verify that Shared Library Files Have Root Ownership
Verify that System Executables Have Restrictive Permissions
Verify that Shared Library Files Have Restrictive Permissions
Add nodev Option to /dev/shm
Add nosuid Option to /dev/shm
Ensure SELinux State is Enforcing
Disable Avahi Server Software
Disable Automatic Bug Reporting Tool (abrtd)
Disable Apache Qpid (qpidd)
Disable Network Router Discovery Daemon (rdisc)
Verify Group Who Owns cron.d
Verify Group Who Owns cron.daily
Verify Group Who Owns cron.hourly
Verify Group Who Owns cron.monthly
Verify Group Who Owns cron.weekly
Verify Group Who Owns Crontab
Verify Owner on cron.daily
Verify Owner on cron.hourly
Verify Owner on cron.monthly
Verify Owner on cron.weekly
Verify Permissions on cron.d
Verify Permissions on cron.daily
Verify Permissions on cron.hourly
Verify Permissions on cron.monthly
Verify Permissions on cron.weekly
Verify Permissions on crontab
Verify Group Who Owns /etc/cron.allow file
Verify User Who Owns /etc/cron.allow file
Uninstall the inet-based telnet server
Uninstall the ssl compliant telnet server
Uninstall the telnet server
Minimize Served Information
Disable Network File System (nfs)
Install the OpenSSH Server Package
Verify Group Who Owns SSH Server config file
Verify Owner on SSH Server config file
Verify /boot/grub2/user.cfg Group Ownership
Verify Permissions on SSH Server config file
Verify Permissions on SSH Server Private *_key Key Files
Verify /boot/grub2/user.cfg User Ownership
Verify Permissions on SSH Server Public *.pub Key Files
Set SSH Client Alive Count Max to zero
Verify /boot/grub2/user.cfg Permissions
Set SSH Client Alive Count Max
Set the Boot Loader Admin Username to a Non-Default Value
Set SSH Client Alive Interval
Verify /boot/efi/EFI/redhat/user.cfg Group Ownership
Verify /boot/efi/EFI/redhat/user.cfg User Ownership
Disable Host-Based Authentication
Verify /boot/efi/EFI/redhat/user.cfg Permissions
Disable SSH Access via Empty Passwords
Set the UEFI Boot Loader Admin Username to a Non-Default Value
Disable SSH Support for .rhosts Files
Enable Use of Strict Mode Checking
Enable Use of Privilege Separation
Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server
Disable Zeroconf Networking
Ensure System is Not Acting as a Network Sniffer
Configure the Firewalld Ports
Set Default firewalld Zone for Incoming Packets
Verify Any Configured IPSec Tunnel Connections
Disable Support for RPC IPv6
Disable Bluetooth Service
Disable Bluetooth Kernel Module
Disable WiFi or Bluetooth in BIOS
Ensure All World-Writable Directories Are Owned by a System Account
Ensure All World-Writable Directories Are Group Owned by a System Account
Ensure All Files Are Owned by a User
Disable Mounting of cramfs
Disable Mounting of freevxfs
Disable Mounting of hfsplus
Disable Mounting of jffs2
Disable Mounting of squashfs
Disable Mounting of vFAT filesystems
Add noexec Option to /dev/shm
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Add noexec Option to /tmp
Add nosuid Option to /tmp
Bind Mount /var/tmp To /tmp
Ensure SELinux Not Disabled in the kernel arguments
Ensure SELinux Not Disabled in /etc/default/grub
Ensure No Device Files are Unlabeled by SELinux
Ensure No Daemons are Unconfined by SELinux
Enable the fips_mode SELinux Boolean
Check Avahi Responses' TTL Field
Serve Avahi Only via Required Protocol
Prevent Other Programs from Using Avahi's Port
Restrict Information Published by Avahi
Uninstall avahi-autoipd Server Package
Uninstall avahi Server Package
Install the psacct package
Enable IRQ Balance (irqbalance)
Enable Process Accounting (psacct)
Disable Advanced Configuration and Power Interface (acpid)
Disable Certmonger Service (certmonger)
Disable Control Group Config (cgconfig)
Disable Control Group Rules Engine (cgred)
Disable CPU Speed (cpupower)
Disable KDump Kernel Crash Analyzer (kdump)
Disable Software RAID Monitor (mdmonitor)
Disable D-Bus IPC Service (messagebus)
Disable Network Console (netconsole)
Disable ntpdate Service (ntpdate)
Disable Odd Job Daemon (oddjobd)
Disable Portreserve (portreserve)
Disable Quota Netlink (quota_nld)
Disable Red Hat Network Service (rhnsd)
Disable Red Hat Subscription Manager Daemon (rhsmcertd)
Disable Cyrus SASL Authentication Daemon (saslauthd)
Disable SMART Disk Monitoring Service (smartd)
Disable System Statistics Reset Service (sysstat)
Disable DHCP Client in ifcfg
Uninstall DHCP Server Package
Authenticate Zone Transfers
Restrict Access to Anonymous Users if Possible
Set Permissions on the /var/log/httpd/ Directory
Set Permissions on All Configuration Files Inside /etc/httpd/conf.d/
Set Permissions on All Configuration Files Inside /etc/httpd/conf/
Set Permissions on All Configuration Files Inside /etc/httpd/conf.modules.d/
Set httpd ServerSignature Directive to Off
Set httpd ServerTokens Directive to Prod
Enable the LDAP Client For Use in Authconfig
Configure LDAP Client to Use TLS For All Transactions
Configure Certificate Directives for LDAP Use of TLS
Uninstall openldap-servers Package
Uninstall Sendmail Package
Disable Postfix Network Listening
Mount Remote Filesystems with Kerberos Security
Mount Remote Filesystems with nodev
Mount Remote Filesystems with noexec
Mount Remote Filesystems with nosuid
Restrict NFS Clients to Privileged Ports
Use Kerberos Security on All Exports
Uninstall rsh-server Package
Uninstall telnet-server Package
Uninstall tftp-server Package
Ensure tftp Daemon Uses Secure Mode
Disable Printer Browsing Entirely if Possible
Disable Print Server Capabilities
Enable the OpenSSH Service
Use Only FIPS 140-2 Validated Ciphers
Use Only FIPS 140-2 Validated MACs
Configure SSSD LDAP Backend to Use TLS For All Transactions
Configure Logind to terminate idle sessions after certain time of inactivity
System Audit Directories Must Be Group Owned By Root
System Audit Directories Must Be Owned By Root
System Audit Logs Must Be Group Owned By Root
The Kubernetes Audit Logs Directory Must Have Mode 0700
The OAuth Audit Logs Directory Must Have Mode 0700
The OpenShift Audit Logs Directory Must Have Mode 0700
Kubernetes Audit Logs Must Be Owned By Root
OAuth Audit Logs Must Be Owned By Root
OpenShift Audit Logs Must Be Owned By Root
Kubernetes Audit Logs Must Have Mode 0600
OAuth Audit Logs Must Have Mode 0600
OpenShift Audit Logs Must Have Mode 0600
Uninstall DHCP Client Package
Verify /boot/grub/grub.cfg User Ownership
Verify /boot/grub/grub.cfg Permissions
Uninstall 389-ds-base Package