CIS_Amazon_Linux_2_Benchmarks
Profile Applicability: Level 2 Description: The space_left_action and admin_space_left_action parameters in the auditd configuration define actions to ta...
Fri, 30 May, 2025 at 4:44 AM
Profile Applicability: Level 2 Description: Changes to the sudoers file or system administration scope define who has elevated privileges on the system. ...
Fri, 30 May, 2025 at 4:57 AM
Profile Applicability: Level 2 Description: The audit system should log all instances where users perform actions as another user, such as using sudo or ...
Fri, 30 May, 2025 at 5:06 AM
Profile Applicability: Level 2 Description: The sudo log file contains records of commands run with elevated privileges. Monitoring modifications to this...
Fri, 30 May, 2025 at 5:14 AM
Profile Applicability: Level 2 Description: Events that modify date and time settings can indicate unauthorized changes or malicious activity. Ensuring t...
Fri, 30 May, 2025 at 5:29 AM
Profile Applicability: • Level 1 Description: The GSSAPIAuthentication option in the SSH daemon (sshd) enables authentication using the Generic Security ...
Fri, 30 May, 2025 at 6:03 AM
Profile Applicability: Level 1 Description: Audit log files contain sensitive security and system activity information. Setting permissions to 0640 or mor...
Fri, 30 May, 2025 at 6:07 AM
Profile Applicability: • Level 1 Description: The HostbasedAuthentication option in the SSH daemon (sshd) allows authentication based on the client host&...
Fri, 30 May, 2025 at 6:12 AM
Profile Applicability: Level 2 Description: Audit log files store sensitive security and system activity information. Ensuring that these files are owned ...
Fri, 30 May, 2025 at 6:14 AM
Profile Applicability: • Level 1 Description: The IgnoreRhosts option in the SSH daemon (sshd) configuration disables the use of .rhosts and .shosts file...
Fri, 30 May, 2025 at 6:23 AM