Capacity
2.2.6
Choose one
19
Rule
Severity: Medium
Verify /boot/grub2/grub.cfg Group Ownership
19
Rule
Severity: Medium
Verify /boot/grub2/grub.cfg User Ownership
30
Rule
Severity: Medium
Ensure No World-Writable Files Exist
22
Rule
Severity: Medium
Ensure All Files Are Owned by a Group
29
Rule
Severity: Medium
Enable cron Service
20
Rule
Severity: Medium
Verify Permissions on cron.d
20
Rule
Severity: Medium
Verify Permissions on cron.daily
20
Rule
Severity: Medium
Verify Permissions on cron.hourly
20
Rule
Severity: Medium
Verify Permissions on cron.monthly
20
Rule
Severity: Medium
Verify Permissions on cron.weekly
20
Rule
Severity: Medium
Verify Permissions on crontab
17
Rule
Severity: Medium
Ensure that /etc/at.deny does not exist
17
Rule
Severity: Medium
Ensure that /etc/cron.deny does not exist
15
Rule
Severity: Medium
Verify Group Who Owns /etc/at.allow file
22
Rule
Severity: Medium
Verify Group Who Owns /etc/cron.allow file
11
Rule
Severity: Medium
Verify User Who Owns /etc/at.allow file
15
Rule
Severity: Medium
Verify Permissions on /etc/at.allow file
19
Rule
Severity: Medium
Verify Permissions on /etc/cron.allow file
20
Rule
Severity: Medium
Verify Permissions on SSH Server config file
29
Rule
Severity: Medium
Verify Permissions on SSH Server Private *_key Key Files
29
Rule
Severity: Medium
Verify Permissions on SSH Server Public *.pub Key Files
30
Rule
Severity: High
Disable SSH Access via Empty Passwords
30
Rule
Severity: Medium
Disable SSH Support for .rhosts Files
30
Rule
Severity: Medium
Disable SSH Root Login
30
Rule
Severity: Medium
Disable SSH TCP Forwarding
30
Rule
Severity: Medium
Do Not Allow SSH Environment Options
29
Rule
Severity: Unknown
Limit Users' SSH Access
30
Rule
Severity: Medium
Set SSH Daemon LogLevel to VERBOSE
30
Rule
Severity: Medium
Set SSH authentication attempt limit
30
Rule
Severity: Medium
Set SSH MaxSessions limit
30
Rule
Severity: Medium
Ensure SSH MaxStartups is configured
18
Rule
Severity: Medium
Ensure All Files Are Owned by a User
2
Rule
Severity: Medium
Verify /boot/grub/grub.cfg User Ownership
29
Rule
Severity: Medium
Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty
29
Rule
Severity: Low
Ensure Sudo Logfile Exists - sudo logfile
29
Rule
Severity: Medium
Ensure Users Re-Authenticate for Privilege Escalation - sudo
30
Rule
Severity: Medium
Verify that All World-Writable Directories Have Sticky Bits Set
30
Rule
Severity: Medium
Verify Group Who Owns Backup group File
30
Rule
Severity: Medium
Verify Group Who Owns Backup passwd File
30
Rule
Severity: Medium
Verify User Who Owns Backup shadow File
30
Rule
Severity: Medium
Verify Group Who Owns group File
30
Rule
Severity: Medium
Verify Group Who Owns passwd File
30
Rule
Severity: Medium
Verify Group Who Owns shadow File
30
Rule
Severity: Medium
Verify User Who Owns Backup group File
30
Rule
Severity: Medium
Verify User Who Owns Backup passwd File
30
Rule
Severity: Medium
Verify Group Who Owns Backup shadow File
30
Rule
Severity: Medium
Verify User Who Owns group File
30
Rule
Severity: Medium
Verify User Who Owns passwd File
30
Rule
Severity: Medium
Verify User Who Owns shadow File
30
Rule
Severity: Medium
Verify Permissions on Backup group File
30
Rule
Severity: Medium
Verify Permissions on Backup passwd File
30
Rule
Severity: Medium
Verify Permissions on Backup shadow File
30
Rule
Severity: Medium
Verify Permissions on group File
30
Rule
Severity: Medium
Verify Permissions on passwd File
30
Rule
Severity: Medium
Verify Permissions on shadow File
20
Rule
Severity: Medium
Verify Group Who Owns cron.d
20
Rule
Severity: Medium
Verify Group Who Owns cron.daily
20
Rule
Severity: Medium
Verify Group Who Owns cron.hourly
20
Rule
Severity: Medium
Verify Group Who Owns cron.monthly
20
Rule
Severity: Medium
Verify Group Who Owns cron.weekly
20
Rule
Severity: Medium
Verify Group Who Owns Crontab
20
Rule
Severity: Medium
Verify Owner on cron.d
20
Rule
Severity: Medium
Verify Owner on cron.daily
20
Rule
Severity: Medium
Verify Owner on cron.hourly
30
Rule
Severity: Medium
Disable X11 Forwarding
30
Rule
Severity: Medium
Enable PAM
20
Rule
Severity: Medium
Verify Owner on cron.monthly
20
Rule
Severity: Medium
Verify Owner on cron.weekly
20
Rule
Severity: Medium
Verify Owner on crontab
30
Rule
Severity: Medium
Ensure SSH LoginGraceTime is configured
18
Rule
Severity: Medium
Install sudo Package
18
Rule
Severity: Medium
Verify /boot/grub2/grub.cfg Permissions
14
Rule
Severity: Medium
Require Re-Authentication When Using the sudo Command
11
Rule
Severity: Medium
Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty
11
Rule
Severity: Medium
Enforce Usage of pam_wheel with Group Parameter for su Authentication
11
Rule
Severity: Medium
Verify /boot/grub2/user.cfg Group Ownership
12
Rule
Severity: Medium
Verify /boot/grub2/user.cfg User Ownership
11
Rule
Severity: Medium
Verify /boot/grub2/user.cfg Permissions
2
Rule
Severity: Medium
Verify /boot/grub/grub.cfg Permissions
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%