Disable the GNOME3 Login Restart and Shutdown Buttons
Disable GDM Automatic Login
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
Ensure that User Home Directories are not Group-Writable or World-Readable
Ensure the Default Bash Umask is Set Correctly
Ensure the Default Umask is Set Correctly in login.defs
Ensure the Default Umask is Set Correctly in /etc/profile
System Audit Logs Must Have Mode 0750 or Less Permissive
System Audit Logs Must Be Owned By Root
Disable Ctrl-Alt-Del Burst Action
Disable Ctrl-Alt-Del Reboot Activation
Ensure the Default C Shell Umask is Set Correctly
Verify /boot/grub2/grub.cfg Group Ownership
Verify /boot/grub2/grub.cfg User Ownership
Verify /boot/grub2/grub.cfg Permissions
Verify the UEFI Boot Loader grub.cfg Group Ownership
Verify the UEFI Boot Loader grub.cfg User Ownership
Verify the UEFI Boot Loader grub.cfg Permissions
Ensure Log Files Are Owned By Appropriate Group
Ensure Log Files Are Owned By Appropriate User
Ensure System Log Files Have Correct Permissions
System Audit Logs Must Have Mode 0640 or Less Permissive
Verify that All World-Writable Directories Have Sticky Bits Set
Ensure All SGID Executables Are Authorized
Ensure All SUID Executables Are Authorized
Ensure No World-Writable Files Exist
Ensure All Files Are Owned by a Group
Enable Kernel Parameter to Enforce DAC on Hardlinks
Enable Kernel Parameter to Enforce DAC on Symlinks
Verify Group Who Owns group File
Verify Group Who Owns gshadow File
Verify Group Who Owns passwd File
Verify Group Who Owns shadow File
Verify User Who Owns group File
Verify User Who Owns gshadow File
Verify User Who Owns passwd File
Verify User Who Owns shadow File
Verify Permissions on group File
Verify Permissions on gshadow File
Verify Permissions on passwd File
Verify Permissions on shadow File
Verify that System Executables Have Root Ownership
Verify that Shared Library Files Have Root Ownership
Verify that System Executables Have Restrictive Permissions
Verify that Shared Library Files Have Restrictive Permissions
Add nodev Option to /dev/shm
Add nosuid Option to /dev/shm
Verify Group Who Owns cron.d
Verify Group Who Owns cron.daily
Verify Group Who Owns cron.hourly
Verify Group Who Owns cron.monthly
Verify Group Who Owns cron.weekly
Verify Group Who Owns Crontab
Verify Owner on cron.daily
Verify Owner on cron.hourly
Verify Owner on cron.monthly
Verify Owner on cron.weekly
Verify Permissions on cron.d
Verify Permissions on cron.daily
Verify Permissions on cron.hourly
Verify Permissions on cron.monthly
Verify Permissions on cron.weekly
Verify Permissions on crontab
Verify Group Who Owns /etc/cron.allow file
Verify User Who Owns /etc/cron.allow file
Verify Group Who Owns SSH Server config file
Verify Owner on SSH Server config file
Verify /boot/grub2/user.cfg Group Ownership
Verify Permissions on SSH Server config file
Verify Permissions on SSH Server Private *_key Key Files
Verify /boot/grub2/user.cfg User Ownership
Verify Permissions on SSH Server Public *.pub Key Files
Verify /boot/grub2/user.cfg Permissions
Verify /boot/efi/EFI/redhat/user.cfg Group Ownership
Verify /boot/efi/EFI/redhat/user.cfg User Ownership
Verify /boot/efi/EFI/redhat/user.cfg Permissions
Ensure All World-Writable Directories Are Owned by a System Account
Ensure All World-Writable Directories Are Group Owned by a System Account
Ensure All Files Are Owned by a User
Add nodev Option to /boot
Add nosuid Option to /boot
Add noexec Option to /dev/shm
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Add noexec Option to /tmp
Add nosuid Option to /tmp
Add nodev Option to /var/log/audit
Add noexec Option to /var/log/audit
Add nosuid Option to /var/log/audit
Add nodev Option to /var/log
Add noexec Option to /var/log
Add nosuid Option to /var/log
Bind Mount /var/tmp To /tmp
Set Permissions on the /var/log/httpd/ Directory
Set Permissions on All Configuration Files Inside /etc/httpd/conf.d/
Set Permissions on All Configuration Files Inside /etc/httpd/conf/
Set Permissions on All Configuration Files Inside /etc/httpd/conf.modules.d/
Mount Remote Filesystems with nosuid
System Audit Directories Must Be Group Owned By Root
System Audit Directories Must Be Owned By Root
System Audit Logs Must Be Group Owned By Root
Enable Kernel Parameter to Enforce DAC on FIFOs
Enable Kernel Parameter to Enforce DAC on Regular files
The Kubernetes Audit Logs Directory Must Have Mode 0700
The OAuth Audit Logs Directory Must Have Mode 0700
The OpenShift Audit Logs Directory Must Have Mode 0700
Kubernetes Audit Logs Must Be Owned By Root
OAuth Audit Logs Must Be Owned By Root
OpenShift Audit Logs Must Be Owned By Root
Kubernetes Audit Logs Must Have Mode 0600
OAuth Audit Logs Must Have Mode 0600
OpenShift Audit Logs Must Have Mode 0600
Limit Containers Ability to use the HostDir volume plugin
Verify /boot/grub/grub.cfg User Ownership
Verify /boot/grub/grub.cfg Permissions
Verify /boot/grub/grub.cfg Group Ownership
Verify /boot/grub/user.cfg Group Ownership
Verify /boot/grub/user.cfg User Ownership
Verify /boot/grub/user.cfg Permissions
Verify /boot/efi/EFI/sles/user.cfg Group Ownership
Verify /boot/efi/EFI/sles/user.cfg User Ownership
Verify /boot/efi/EFI/sles/user.cfg Permissions