Verify File Hashes with RPM
Configure AIDE to Use FIPS 140-2 for Validating Hashes
Configure AIDE to Verify Access Control Lists (ACLs)
Configure AIDE to Verify Extended Attributes
Install the Host Intrusion Prevention System (HIPS) Module
Ensure /home Located On Separate Partition
Ensure /tmp Located On Separate Partition
Ensure /var Located On Separate Partition
Ensure /var/log Located On Separate Partition
Ensure /var/log/audit Located On Separate Partition
The Installed Operating System Is Vendor Supported
Install Virus Scanning Software
Ensure gnutls-utils is installed
Ensure nss-tools is installed
Ensure Software Patches Installed
Install McAfee Virus Scanning Software
Virus Scanning Software Definitions Are Updated
Ensure PAM Displays Last Logon/Access Notification
Install the Asset Configuration Compliance Module (ACCM)
Install the Policy Auditor (PA) Module
Ensure PAM Enforces Password Requirements - Authentication Retry Prompts Permitted Per-Session
Ensure /var/tmp Located On Separate Partition
Remove the GDM Package Group
Make sure that the dconf databases are up-to-date with regards to respective keyfiles
Disable the GNOME3 Login Restart and Shutdown Buttons
Disable the GNOME3 Login User List
Disable GNOME3 Automounting
Disable GNOME3 Automount Opening
Disable GNOME3 Automount running
Require Encryption for Remote Access in GNOME3
Prevent Login to Accounts With Empty Password
Ensure There Are No Accounts With Blank or Null Passwords
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
Verify Only Root Has UID 0
Ensure that System Accounts Do Not Run a Shell Upon Login
The operating system must restrict privilege elevation to authorized personnel
Ensure sudo only includes the default configuration directory
Ensure invoking users password for privilege escalation when using sudo
Install openscap-scanner Package
Install rng-tools Package
Install scap-security-guide Package
All Interactive User Home Directories Must Be Group-Owned By The Primary Group
All Interactive User Home Directories Must Be Owned By The Primary User
Uninstall gssproxy Package
Uninstall iprutils Package
Ensure the Default Bash Umask is Set Correctly
Ensure the Default Umask is Set Correctly in /etc/profile
Ensure PAM password complexity module is enabled in password-auth
Ensure PAM password complexity module is enabled in system-auth
Disable debug-shell SystemD Service
Disable Ctrl-Alt-Del Burst Action
Disable Ctrl-Alt-Del Reboot Activation
Verify that Interactive Boot is Disabled
Only Authorized Local User Accounts Exist on Operating System
Ensure Home Directories are Created for New Users
User Initialization Files Must Be Group-Owned By The Primary Group
User Initialization Files Must Not Run World-Writable Programs
User Initialization Files Must Be Owned By the Primary User
Ensure that Users Path Contains Only Local Directories
All Interactive Users Must Have A Home Directory Defined
All Interactive Users Home Directories Must Exist
All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group
All User Files and Directories In The Home Directory Must Have a Valid Owner
All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive
Ensure All User Initialization Files Have Mode 0740 Or Less Permissive
All Interactive User Home Directories Must Have mode 0750 Or Less Permissive
Ensure the Default C Shell Umask is Set Correctly
Ensure the Default Umask is Set Correctly For Interactive Users
Include Local Events in Audit Logs
Resolve information before writing to audit logs
Write Audit Logs to the Disk
Verify /boot/grub2/grub.cfg Group Ownership
Ensure rsyslog is Installed
Ensure Logs Sent To Remote Host
Install firewalld Package
Install libreswan Package
Configure Accepting Router Advertisements on All IPv6 Interfaces
Disable Accepting ICMP Redirects for All IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces
Disable Kernel Parameter for IPv6 Forwarding
Disable Accepting Router Advertisements on all IPv6 Interfaces by Default
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default
Disable Accepting ICMP Redirects for All IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces
Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default
Enable Kernel Paremeter to Log Martian Packets on all IPv4 Interfaces by Default
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default
Configure Kernel Parameter for Accepting Secure Redirects By Default
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces
Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces
Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default
Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces
Ensure All Files Are Owned by a Group
Verify Group Who Owns Backup group File
Verify Group Who Owns Backup gshadow File
Verify Group Who Owns Backup passwd File
Verify User Who Owns Backup shadow File
Verify Group Who Owns group File
Verify Group Who Owns gshadow File
Verify Group Who Owns passwd File
Verify Group Who Owns shadow File
Verify User Who Owns Backup group File
Verify User Who Owns Backup gshadow File
Verify User Who Owns Backup passwd File
Verify Group Who Owns Backup shadow File
Verify User Who Owns group File
Verify User Who Owns gshadow File
Verify User Who Owns passwd File
Verify User Who Owns shadow File
Verify Permissions on Backup group File
Verify Permissions on Backup gshadow File
Verify Permissions on Backup passwd File
Verify Permissions on Backup shadow File
Verify Permissions on group File
Verify Permissions on gshadow File
Verify Permissions on passwd File
Verify Permissions on shadow File
Disable core dump backtraces
Disable storing core dump
Disable Core Dumps for All Users
Restrict Exposed Kernel Pointer Addresses Access
Enable Randomized Layout of Virtual Address Space
Verify Group Who Owns cron.d
Verify Group Who Owns cron.daily
Verify Group Who Owns cron.hourly
Verify Group Who Owns cron.monthly
Verify Group Who Owns cron.weekly
Verify Group Who Owns Crontab
Verify Owner on cron.daily
Verify Owner on cron.hourly
Verify Owner on cron.monthly
Verify Owner on cron.weekly
Verify Permissions on cron.d
Verify Permissions on cron.daily
Verify Permissions on cron.hourly
Verify Permissions on cron.monthly
Verify Permissions on cron.weekly
Verify Permissions on crontab
Verify Group Who Owns /etc/cron.allow file
Verify User Who Owns /etc/cron.allow file
Verify Permissions on /etc/cron.allow file
Configure auditd flush priority
Verify Group Who Owns SSH Server config file
Verify Owner on SSH Server config file
Verify /boot/grub2/user.cfg Group Ownership
Verify Permissions on SSH Server config file
Verify Permissions on SSH Server Private *_key Key Files
Verify Permissions on SSH Server Public *.pub Key Files
Allow Only SSH Protocol 2
Disable Compression Or Set Compression to delayed
Disable SSH Access via Empty Passwords
Disable GSSAPI Authentication
Disable Kerberos Authentication
Ensure rsyslog-gnutls is installed
Disable SSH Support for .rhosts Files
Disable SSH Support for Rhosts RSA Authentication
Disable SSH Support for User Known Hosts
Enable Use of Strict Mode Checking
Ensure cron Is Logging To Rsyslog
Enable Encrypted X11 Forwarding
Enable SSH Print Last Log
Force frequent session key renegotiation
Enable Use of Privilege Separation
Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server
Configure TLS for rsyslog remote logging
Configure CA certificate for rsyslog remote logging
Configure Multiple DNS Servers in /etc/resolv.conf
Disable Client Dynamic DNS Updates
Ensure System is Not Acting as a Network Sniffer
Set Default firewalld Zone for Incoming Packets
Verify Any Configured IPSec Tunnel Connections
Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces
Ensure All World-Writable Directories Are Owned by root User
Ensure All World-Writable Directories Are Owned by a System Account
Ensure All World-Writable Directories Are Group Owned by a System Account
Ensure All Files Are Owned by a User
Disable Modprobe Loading of USB Storage Driver
Add nosuid Option to /boot
Add noexec Option to /home
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Disable Kernel Image Loading
Restrict usage of ptrace to descendant processes
Enable page allocator poisoning
Install policycoreutils Package
Ensure No Device Files are Unlabeled by SELinux
Disable KDump Kernel Crash Analyzer (kdump)
Uninstall Sendmail Package
Prevent Unrestricted Mail Relaying
Mount Remote Filesystems with Kerberos Security
Mount Remote Filesystems with nodev
Mount Remote Filesystems with noexec
Mount Remote Filesystems with nosuid
Use Kerberos Security on All Exports
Install tcp_wrappers Package
Remove Host-Based Authentication Files
Remove User Host-Based Authentication Files
Uninstall tftp-server Package
Ensure tftp Daemon Uses Secure Mode
Ensure Default SNMP Password Is Not Used
Prevent remote hosts from connecting to the proxy display
Remove the X Windows Package Group
Disable graphical user interface
Disable X Windows Startup By Setting Default Target
OpenSSL uses strong entropy source
Configure kernel to trust the CPU random number generator
Install iptables-services Package
Add nosuid Option to /boot/efi
Disable storing core dumps
Disable Access to Network bpf() Syscall From Unprivileged Processes
Harden the operation of the BPF just-in-time compiler
Disable the use of user namespaces
Disable acquiring, saving, and processing core dumps
Install policycoreutils-python-utils package
Enable the Hardware RNG Entropy Gatherer Service
Install OpenSSH client software
SSH client uses strong entropy to seed (for CSH like shells)
SSH client uses strong entropy to seed (Bash-like shells)
SSH server uses strong entropy to seed
Configure SSSD to run as user sssd
Grant Or Deny System Access To Specific Hosts And Services
System Must Avoid Meltdown and Spectre Exploit Vulnerabilities in Modern Processors
The PAM configuration should not be changed automatically
Remove Default Configuration to Disable Syscall Auditing
Install the pam_apparmor Package
Ensure AppArmor is Active and Configured
Install strongswan Package
Disable Kernel Parameter for IPv6 Forwarding by default
Verify /boot/grub2/grub.cfg User Ownership
NetworkManager DNS Mode Must Be Must Configured
Verify Group Who Owns cron.deny
Verify Owner on cron.deny
Verify /boot/grub/grub.cfg User Ownership