Harden SSH client Crypto Policy
The Installed Operating System Is FIPS 140-2 Certified
Ensure that File Integrity Operator is scanning the cluster
Verify and Correct File Permissions with RPM
Configure Periodic Execution of AIDE
Configure System Cryptography Policy
Configure Libreswan to use System Crypto Policy
Configure OpenSSL library to use System Crypto Policy
Configure SSH to use System Crypto Policy
Build and Test AIDE Database
Configure Notification of Post-AIDE Scan Details
Configure AIDE to Use FIPS 140-2 for Validating Hashes
Configure AIDE to Verify Access Control Lists (ACLs)
Configure AIDE to Verify Extended Attributes
Install the Host Intrusion Prevention System (HIPS) Module
Ensure /home Located On Separate Partition
Ensure /tmp Located On Separate Partition
Ensure /var Located On Separate Partition
Ensure /var/log Located On Separate Partition
Install the dracut-fips-aesni Package
Install the dracut-fips Package
Ensure '/etc/system-fips' exists
Ensure /var/log/audit Located On Separate Partition
Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate
Enable FIPS Mode in GRUB2
Harden SSHD Crypto Policy
The Installed Operating System Is Vendor Supported
Install Virus Scanning Software
Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
Ensure Users Re-Authenticate for Privilege Escalation - sudo
Install Intrusion Detection Software
Install McAfee Virus Scanning Software
Ensure gpgcheck Enabled In Main yum Configuration
Ensure Red Hat GPG Key Installed
Ensure Software Patches Installed
Virus Scanning Software Definitions Are Updated
Install the Asset Configuration Compliance Module (ACCM)
Install the Policy Auditor (PA) Module
Ensure PAM Enforces Password Requirements - Minimum Different Categories
Ensure PAM Enforces Password Requirements - Minimum Length
Ensure PAM Enforces Password Requirements - Authentication Retry Prompts Permitted Per-Session
Set PAM''s Password Hashing Algorithm
Require Authentication for Emergency Systemd Target
Remove the GDM Package Group
Disable the GNOME3 Login Restart and Shutdown Buttons
Disable the GNOME3 Login User List
Disable GDM Automatic Login
Disable GNOME3 Automounting
Require Authentication for Single User Mode
Set Account Expiration Following Inactivity
Disable GNOME3 Automount Opening
Disable GNOME3 Automount running
Disable All GNOME3 Thumbnailers
Require Encryption for Remote Access in GNOME3
Enable GNOME3 Screensaver Idle Activation
Ensure Users Cannot Change GNOME3 Screensaver Idle Activation
Set GNOME3 Screensaver Inactivity Timeout
Set Password Minimum Length in login.defs
Set Existing Passwords Maximum Age
Set Existing Passwords Minimum Age
Verify All Account Password Hashes are Shadowed
Set GNOME3 Screensaver Lock Delay After Activation Period
Enable GNOME3 Screensaver Lock After Idle Period
Ensure Users Cannot Change GNOME3 Screensaver Lock After Idle Period
All GIDs referenced in /etc/passwd must be defined in /etc/group
Prevent Login to Accounts With Empty Password
Implement Blank Screensaver
Ensure Users Cannot Change GNOME3 Screensaver Settings
Ensure Users Cannot Change GNOME3 Session Idle Settings
Verify No netrc Files Exist
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
Direct root Logins Not Allowed
Ensure that System Accounts Do Not Run a Shell Upon Login
Restrict Serial Port Root Logins
Restrict Virtual Console Root Logins
Ensure the Logon Failure Delay is Set Correctly in login.defs
Limit the Number of Concurrent Login Sessions Allowed Per User
Set Interactive Session Timeout
Ensure yum Removes Previous Package Versions
Ensure that User Home Directories are not Group-Writable or World-Readable
Ensure that Root's Path Does Not Include World or Group-Writable Directories
Ensure that Root's Path Does Not Include Relative Paths or Null Directories
Ensure the Default Bash Umask is Set Correctly
Ensure the Default Umask is Set Correctly in login.defs
Ensure the Default Umask is Set Correctly in /etc/profile
Ensure the audit Subsystem is Installed
Ensure gpgcheck Enabled for Local Packages
Ensure gpgcheck Enabled for All yum Package Repositories
Ensure gpgcheck Enabled for Repository Metadata
Make the auditd Configuration Immutable
Record Events that Modify the System's Mandatory Access Controls
Record Events that Modify the System's Mandatory Access Controls in usr/share
Ensure auditd Collects Information on Exporting to Media (successful)
Record Events that Modify the System's Network Environment
Record Attempts to Alter Process and Session Initiation Information
Lock Accounts After Failed Password Attempts
Configure the root Account for Failed Password Attempts
Set Interval For Counting Failed Password Attempts
Ensure auditd Collects System Administrator Actions
Set Lockout Time for Failed Password Attempts
Record Events that Modify User/Group Information
Ensure PAM Enforces Password Requirements - Minimum Digit Characters
Ensure PAM Enforces Password Requirements - Minimum Different Characters
Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters
System Audit Logs Must Have Mode 0750 or Less Permissive
System Audit Logs Must Be Owned By Root
Ensure PAM Enforces Password Requirements - Maximum Consecutive Repeating Characters from Same Character Class
Set Password Maximum Consecutive Repeating Characters
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Ensure PAM Enforces Password Requirements - Minimum Special Characters
Record Events that Modify the System's Discretionary Access Controls - fchmod
Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Set Password Hashing Algorithm in /etc/libuser.conf
Set Password Hashing Algorithm in /etc/login.defs
Record Events that Modify the System's Discretionary Access Controls - fchown
Set PAM''s Password Hashing Algorithm - password-auth
Record Events that Modify the System's Discretionary Access Controls - fchownat
Disable Ctrl-Alt-Del Burst Action
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Disable Ctrl-Alt-Del Reboot Activation
Verify that Interactive Boot is Disabled
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Install the screen Package
Install the opensc Package For Multifactor Authentication
Install the pcsc-lite package
Install Smart Card Packages For Multifactor Authentication
Configure opensc Smart Card Drivers
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Configure NSS DB To Use opensc
Record Events that Modify the System's Discretionary Access Controls - setxattr
Force opensc To Use Defined Smart Card Driver
Ensure auditd Collects File Deletion Events by User
Ensure auditd Collects File Deletion Events by User - rename
Assign Expiration Date to Emergency Accounts
Assign Expiration Date to Temporary Accounts
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Set Existing Passwords Warning Age
Ensure auditd Collects File Deletion Events by User - unlinkat
Set existing passwords a period of inactivity before they been locked
Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure that System Accounts Are Locked
Ensure auditd Collects Information on Kernel Module Loading and Unloading
Root Path Must Be Vendor Default
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Ensure the Default C Shell Umask is Set Correctly
Ensure auditd Collects Information on the Use of Privileged Commands
Record attempts to alter time through adjtimex
Ensure the audit-libs package as a part of audit Subsystem is Installed
Record Attempts to Alter Time Through clock_settime
Record attempts to alter time through settimeofday
Record Attempts to Alter Time Through stime
Record Attempts to Alter the localtime File
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information via open syscall - /etc/group
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/group
Record Events that Modify User/Group Information via openat syscall - /etc/group
Record Events that Modify User/Group Information via open syscall - /etc/gshadow
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/gshadow
Record Events that Modify User/Group Information via openat syscall - /etc/gshadow
Record Events that Modify User/Group Information via open syscall - /etc/passwd
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/passwd
Configure auditd to use audispd's syslog plugin
Configure auditd Disk Error Action on Disk Error
Configure auditd Disk Full Action when Disk Space Is Full
Record Events that Modify User/Group Information via openat syscall - /etc/passwd
Record Events that Modify User/Group Information via open syscall - /etc/shadow
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/shadow
Record Events that Modify User/Group Information via openat syscall - /etc/shadow
Configure auditd mail_acct Action on Low Disk Space
Configure auditd admin_space_left Action on Low Disk Space
Configure auditd Max Log File Size
Configure auditd max_log_file_action Upon Reaching Maximum Log Size
Configure auditd Number of Logs Retained
Configure auditd space_left Action on Low Disk Space
Verify /boot/grub2/grub.cfg Group Ownership
Verify /boot/grub2/grub.cfg User Ownership
Verify /boot/grub2/grub.cfg Permissions
Shutdown System When Auditing Failures Occur
Set Boot Loader Password in grub2
Verify the UEFI Boot Loader grub.cfg Group Ownership
Verify the UEFI Boot Loader grub.cfg User Ownership
Verify the UEFI Boot Loader grub.cfg Permissions
Set the UEFI Boot Loader Password
Ensure rsyslog is Installed
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Ensure Log Files Are Owned By Appropriate Group
Ensure Log Files Are Owned By Appropriate User
Ensure System Log Files Have Correct Permissions
Ensure logrotate is Installed
Ensure Logrotate Runs Periodically
Ensure syslog-ng is Installed
Record Events that Modify User/Group Information - /etc/passwd
Enable rsyslog to Accept Messages via TCP, if Acting As Log Server
Record Events that Modify User/Group Information - /etc/shadow
Record Access Events to Audit Log Directory
Enable rsyslog to Accept Messages via UDP, if Acting As Log Server
Ensure Logs Sent To Remote Host
Install firewalld Package
Install libreswan Package
System Audit Logs Must Have Mode 0640 or Less Permissive
Verify ip6tables Enabled if Using IPv6
Set Default ip6tables Policy for Incoming Packets
Set Default iptables Policy for Incoming Packets
Set Default iptables Policy for Forwarded Packets
Disable IPv6 Networking Support Automatic Loading
Disable IPv6 Addressing on All IPv6 Interfaces
Disable IPv6 Addressing on IPv6 Interfaces by Default
Configure Accepting Router Advertisements on All IPv6 Interfaces
Disable Accepting ICMP Redirects for All IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces
Disable Kernel Parameter for IPv6 Forwarding
Disable Accepting Router Advertisements on all IPv6 Interfaces by Default
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default
Disable Accepting ICMP Redirects for All IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces
Record Any Attempts to Run chcon
Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces
Record Any Attempts to Run restorecon
Record Any Attempts to Run semanage
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces
Record Any Attempts to Run setfiles
Record Any Attempts to Run setsebool
Record Any Attempts to Run seunshare
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default
Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default
Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces
Record Unsuccessful Permission Changes to Files - chmod
Record Unsuccessful Ownership Changes to Files - chown
Record Unsuccessful Permission Changes to Files - fchmod
Record Unsuccessful Permission Changes to Files - fchmodat
Record Unsuccessful Ownership Changes to Files - fchown
Record Unsuccessful Ownership Changes to Files - fchownat
Record Unsuccessful Permission Changes to Files - fremovexattr
Record Unsuccessful Permission Changes to Files - fsetxattr
Deactivate Wireless Network Interfaces
Record Unsuccessful Ownership Changes to Files - lchown
Record Unsuccessful Permission Changes to Files - lremovexattr
Record Unsuccessful Permission Changes to Files - lsetxattr
Verify that All World-Writable Directories Have Sticky Bits Set
Ensure All SGID Executables Are Authorized
Ensure All SUID Executables Are Authorized
Ensure No World-Writable Files Exist
Ensure All Files Are Owned by a Group
Enable Kernel Parameter to Enforce DAC on Hardlinks
Enable Kernel Parameter to Enforce DAC on Symlinks
Record Unsuccessful Creation Attempts to Files - open_by_handle_at O_CREAT
Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE
Verify Group Who Owns group File
Verify Group Who Owns gshadow File
Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly
Verify Group Who Owns passwd File
Verify Group Who Owns shadow File
Record Unsuccessful Creation Attempts to Files - open O_CREAT
Verify User Who Owns group File
Verify User Who Owns gshadow File
Record Unsuccessful Modification Attempts to Files - open O_TRUNC_WRITE
Verify User Who Owns passwd File
Verify User Who Owns shadow File
Ensure auditd Rules For Unauthorized Attempts To open Are Ordered Correctly
Verify Permissions on group File
Verify Permissions on gshadow File
Verify Permissions on passwd File
Verify Permissions on shadow File
Record Unsuccessful Creation Attempts to Files - openat O_CREAT
Record Unsuccessful Modification Attempts to Files - openat O_TRUNC_WRITE
Verify that System Executables Have Root Ownership
Verify that Shared Library Files Have Root Ownership
Ensure auditd Rules For Unauthorized Attempts To openat Are Ordered Correctly
Record Unsuccessful Permission Changes to Files - removexattr
Verify that System Executables Have Restrictive Permissions
Verify that Shared Library Files Have Restrictive Permissions
Record Unsuccessful Delete Attempts to Files - rename
Record Unsuccessful Delete Attempts to Files - renameat
Record Unsuccessful Permission Changes to Files - setxattr
Add nodev Option to /dev/shm
Add nosuid Option to /dev/shm
Restrict Exposed Kernel Pointer Addresses Access
Record Unsuccessful Delete Attempts to Files - unlink
Record Unsuccessful Delete Attempts to Files - unlinkat
Enable Randomized Layout of Virtual Address Space
Record Attempts to Alter Logon and Logout Events
Record Attempts to Alter Logon and Logout Events - faillock
Record Attempts to Alter Logon and Logout Events - lastlog
Record Attempts to Alter Logon and Logout Events - tallylog
Ensure auditd Collects Information on the Use of Privileged Commands - at
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Disable Avahi Server Software
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgidmap
Disable Automatic Bug Reporting Tool (abrtd)
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - newuidmap
Disable Apache Qpid (qpidd)
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Disable Network Router Discovery Daemon (rdisc)
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - pt_chown
Verify Group Who Owns cron.d
Verify Group Who Owns cron.daily
Verify Group Who Owns cron.hourly
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Verify Group Who Owns cron.monthly
Verify Group Who Owns cron.weekly
Verify Group Who Owns Crontab
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Verify Owner on cron.daily
Verify Owner on cron.hourly
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Verify Owner on cron.monthly
Verify Owner on cron.weekly
Verify Permissions on cron.d
Verify Permissions on cron.daily
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects Information on the Use of Privileged Commands - usernetctl
Verify Permissions on cron.hourly
Verify Permissions on cron.monthly
Verify Permissions on cron.weekly
Verify Permissions on crontab
Verify Group Who Owns /etc/cron.allow file
Verify User Who Owns /etc/cron.allow file
Uninstall the inet-based telnet server
Uninstall the ssl compliant telnet server
Uninstall the telnet server
Minimize Served Information
Configure audispd's Plugin disk_full_action When Disk Is Full
Encrypt Audit Records Sent With audispd Plugin
Configure audispd's Plugin network_failure_action On Network Failure
Configure System to Forward All Mail For The Root Account
Configure auditd admin_space_left on Low Disk Space
Configure auditd flush priority
Disable Network File System (nfs)
A remote time server for Chrony is configured
Configure auditd space_left on Low Disk Space
Install the OpenSSH Server Package
Verify Group Who Owns SSH Server config file
Verify Owner on SSH Server config file
Verify /boot/grub2/user.cfg Group Ownership
Verify Permissions on SSH Server config file
Verify Permissions on SSH Server Private *_key Key Files
Verify /boot/grub2/user.cfg User Ownership
Verify Permissions on SSH Server Public *.pub Key Files
Verify /boot/grub2/user.cfg Permissions
Set SSH Client Alive Count Max to zero
Set SSH Client Alive Count Max
Set the Boot Loader Admin Username to a Non-Default Value
Set SSH Client Alive Interval
Verify /boot/efi/EFI/redhat/user.cfg Group Ownership
Verify /boot/efi/EFI/redhat/user.cfg User Ownership
Disable Host-Based Authentication
Allow Only SSH Protocol 2
Disable Compression Or Set Compression to delayed
Verify /boot/efi/EFI/redhat/user.cfg Permissions
Disable SSH Access via Empty Passwords
Set the UEFI Boot Loader Admin Username to a Non-Default Value
Disable GSSAPI Authentication
Disable Kerberos Authentication
Disable SSH Support for .rhosts Files
Disable SSH Support for Rhosts RSA Authentication
Disable SSH Support for User Known Hosts
Do Not Allow SSH Environment Options
Enable Use of Strict Mode Checking
Enable SSH Warning Banner
Ensure cron Is Logging To Rsyslog
Enable Encrypted X11 Forwarding
Set SSH Daemon LogLevel to VERBOSE
Enable Use of Privilege Separation
Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server
Configure TLS for rsyslog remote logging
Configure Multiple DNS Servers in /etc/resolv.conf
Disable Client Dynamic DNS Updates
Disable Zeroconf Networking
Prevent non-Privileged Users from Modifying Network Interfaces using nmcli
Ensure System is Not Acting as a Network Sniffer
Configure the Firewalld Ports
Configure firewalld To Rate Limit Connections
Set Default firewalld Zone for Incoming Packets
Verify Any Configured IPSec Tunnel Connections
Disable Support for RPC IPv6
Disable Bluetooth Service
Disable Bluetooth Kernel Module
Disable WiFi or Bluetooth in BIOS
Ensure All World-Writable Directories Are Owned by a System Account
Ensure All World-Writable Directories Are Group Owned by a System Account
Ensure All Files Are Owned by a User
Disable Booting from USB Devices in Boot Firmware
Disable Kernel Support for USB via Bootloader Configuration
Disable Mounting of cramfs
Disable Mounting of freevxfs
Disable Mounting of hfsplus
Disable Mounting of jffs2
Disable Mounting of squashfs
Disable Modprobe Loading of USB Storage Driver
Disable Mounting of vFAT filesystems
Add nodev Option to /boot
Add nosuid Option to /boot
Add noexec Option to /dev/shm
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Add noexec Option to /tmp
Add nosuid Option to /tmp
Add nodev Option to /var/log/audit
Add noexec Option to /var/log/audit
Add nosuid Option to /var/log/audit
Add nodev Option to /var/log
Add noexec Option to /var/log
Add nosuid Option to /var/log
Bind Mount /var/tmp To /tmp
Enable ExecShield via sysctl
Enable NX or XD Support in the BIOS
Install PAE Kernel on Supported 32-bit x86 Systems
Enable page allocator poisoning
Enable SLUB/SLAB allocator poisoning
Ensure No Device Files are Unlabeled by SELinux
Ensure No Daemons are Unconfined by SELinux
Enable the fips_mode SELinux Boolean
Check Avahi Responses' TTL Field
Serve Avahi Only via Required Protocol
Prevent Other Programs from Using Avahi's Port
Restrict Information Published by Avahi
Uninstall avahi-autoipd Server Package
Uninstall avahi Server Package
Install the psacct package
Enable IRQ Balance (irqbalance)
Enable Process Accounting (psacct)
Disable Advanced Configuration and Power Interface (acpid)
Disable Certmonger Service (certmonger)
Disable Control Group Config (cgconfig)
Disable Control Group Rules Engine (cgred)
Disable CPU Speed (cpupower)
Disable KDump Kernel Crash Analyzer (kdump)
Disable Software RAID Monitor (mdmonitor)
Disable D-Bus IPC Service (messagebus)
Disable Network Console (netconsole)
Disable ntpdate Service (ntpdate)
Disable Odd Job Daemon (oddjobd)
Disable Portreserve (portreserve)
Disable Quota Netlink (quota_nld)
Disable Red Hat Network Service (rhnsd)
Disable Red Hat Subscription Manager Daemon (rhsmcertd)
Disable Cyrus SASL Authentication Daemon (saslauthd)
Disable SMART Disk Monitoring Service (smartd)
Disable System Statistics Reset Service (sysstat)
Disable DHCP Client in ifcfg
Uninstall DHCP Server Package
Authenticate Zone Transfers
Restrict Access to Anonymous Users if Possible
Set Permissions on the /var/log/httpd/ Directory
Set Permissions on All Configuration Files Inside /etc/httpd/conf.d/
Set Permissions on All Configuration Files Inside /etc/httpd/conf/
Set Permissions on All Configuration Files Inside /etc/httpd/conf.modules.d/
Set httpd ServerSignature Directive to Off
Set httpd ServerTokens Directive to Prod
Enable the LDAP Client For Use in Authconfig
Configure LDAP Client to Use TLS For All Transactions
Configure Certificate Directives for LDAP Use of TLS
Uninstall openldap-servers Package
Uninstall Sendmail Package
Disable Postfix Network Listening
Mount Remote Filesystems with Kerberos Security
Mount Remote Filesystems with nodev
Mount Remote Filesystems with noexec
Restrict NFS Clients to Privileged Ports
Use Kerberos Security on All Exports
Configure Time Service Maxpoll Interval
Specify Additional Remote NTP Servers
Specify a Remote NTP Server
Specify Additional Remote NTP Servers
Install tcp_wrappers Package
Uninstall rsh-server Package
Uninstall telnet-server Package
Uninstall tftp-server Package
Disable Printer Browsing Entirely if Possible
Disable Print Server Capabilities
Enable the OpenSSH Service
Use Only FIPS 140-2 Validated Ciphers
Use Only FIPS 140-2 Validated MACs
Configure PAM in SSSD Services
Configure SSSD's Memory Cache to Expire
Configure SSSD to Expire Offline Credentials
Configure SSSD to Expire SSH Known Hosts
Configure SSSD LDAP Backend Client CA Certificate
Configure SSSD LDAP Backend Client CA Certificate Location
Configure SSSD LDAP Backend Client to Demand a Valid Certificate from the Server
Configure SSSD LDAP Backend to Use TLS For All Transactions
Remove the X Windows Package Group
Disable X Windows Startup By Setting Default Target
Enable Dracut FIPS Module
Set kernel parameter 'crypto.fips_enabled' to 1
Configure dnf-automatic to Install Available Updates Automatically
Configure dnf-automatic to Install Only Security Updates
Enable dnf-automatic Timer
Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words
Ensure PAM Enforces Password Requirements - Enforce for root User
Configure Logind to terminate idle sessions after certain time of inactivity
Configure the tmux Lock Command
Ensure dnf Removes Previous Package Versions
Ensure gpgcheck Enabled In Main dnf Configuration
Ensure gpgcheck Enabled for All dnf Package Repositories
System Audit Directories Must Be Group Owned By Root
System Audit Directories Must Be Owned By Root
System Audit Logs Must Be Group Owned By Root
Install iptables-services Package
Disable Kernel cfg80211 Module
Disable Kernel iwlmvm Module
Disable Kernel iwlwifi Module
Disable Kernel mac80211 Module
Enable Kernel Parameter to Enforce DAC on FIFOs
Enable Kernel Parameter to Enforce DAC on Regular files
Disable the use of user namespaces
Install fapolicyd Package
Enable the File Access Policy Service
Ensure Fedora GPG Key Installed
Record Access Events to Kubernetes Audit Log Directory
Record Access Events to OAuth Audit Log Directory
Record Access Events to OpenShift Audit Log Directory
The Kubernetes Audit Logs Directory Must Have Mode 0700
The OAuth Audit Logs Directory Must Have Mode 0700
The OpenShift Audit Logs Directory Must Have Mode 0700
Kubernetes Audit Logs Must Be Owned By Root
OAuth Audit Logs Must Be Owned By Root
OpenShift Audit Logs Must Be Owned By Root
Kubernetes Audit Logs Must Have Mode 0600
OAuth Audit Logs Must Have Mode 0600
OpenShift Audit Logs Must Have Mode 0600
Ensure Oracle Linux GPG Key Installed
Extend Audit Backlog Limit for the Audit Daemon
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Install the OpenSSH Client and Server Package
Install iptables-nft Package
Disable Kernel Support for USB via Bootloader Configuration
Ensure zypper Removes Previous Package Versions
Ensure gpgcheck Enabled In Main zypper Configuration
Ensure gpgcheck Enabled for All zypper Package Repositories
Ensure SUSE GPG Key Installed
Configure the root Account lock for Failed Password Attempts via pam_tally2
Set Lockout Time for Failed Password Attempts using pam_tally2
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
Enable systemd_timesyncd Service
Ensure apt_get Removes Previous Package Versions
Install the pam_apparmor Package
Ensure AppArmor is Active and Configured
Install strongswan Package
Uninstall DHCP Client Package
Chrony Configure Pool and Server
Verify /boot/grub/grub.cfg User Ownership
Verify /boot/grub/grub.cfg Permissions
Install the systemd_timesyncd Service
Uninstall 389-ds-base Package
Configure Systemd Timer Execution of AIDE