CIS_Amazon_Linux_2_Benchmarks

Ensure System Warns When Audit Logs Are Low on Space (Automated)
Profile Applicability: Level 2 Description: The space_left_action and admin_space_left_action parameters in the auditd configuration define actions to ta...
Fri, 30 May, 2025 at 4:44 AM
Ensure Changes to System Administration Scope (sudoers) Are Collected (Automated)
Profile Applicability: Level 2 Description: Changes to the sudoers file or system administration scope define who has elevated privileges on the system. ...
Fri, 30 May, 2025 at 4:57 AM
Ensure Actions as Another User Are Always Logged (Automated)
Profile Applicability: Level 2 Description: The audit system should log all instances where users perform actions as another user, such as using sudo or ...
Fri, 30 May, 2025 at 5:06 AM
Ensure Events That Modify the Sudo Log File Are Collected (Automated)
Profile Applicability: Level 2 Description: The sudo log file contains records of commands run with elevated privileges. Monitoring modifications to this...
Fri, 30 May, 2025 at 5:14 AM
Ensure Events That Modify Date and Time Information Are Collected
Profile Applicability: Level 2 Description: Events that modify date and time settings can indicate unauthorized changes or malicious activity. Ensuring t...
Fri, 30 May, 2025 at 5:29 AM
Ensure sshd GSSAPIAuthentication Is Disabled
Profile Applicability:  • Level 1 Description:  The GSSAPIAuthentication option in the SSH daemon (sshd) enables authentication using the Generic Security ...
Fri, 30 May, 2025 at 6:03 AM
Ensure Audit Log Files Have Permissions Set to 0640 or More Restrictive
Profile Applicability: Level 1 Description:  Audit log files contain sensitive security and system activity information. Setting permissions to 0640 or mor...
Fri, 30 May, 2025 at 6:07 AM
Ensure sshd HostbasedAuthentication Is Disabled
Profile Applicability:  • Level 1 Description:  The HostbasedAuthentication option in the SSH daemon (sshd) allows authentication based on the client host&...
Fri, 30 May, 2025 at 6:12 AM
Ensure Only Authorized Users Own Audit Log Files
Profile Applicability: Level 2 Description:  Audit log files store sensitive security and system activity information. Ensuring that these files are owned ...
Fri, 30 May, 2025 at 6:14 AM
Ensure sshd IgnoreRhosts Is Enabled
Profile Applicability:  • Level 1 Description:  The IgnoreRhosts option in the SSH daemon (sshd) configuration disables the use of .rhosts and .shosts file...
Fri, 30 May, 2025 at 6:23 AM