Security Configuration Assessment Report

for ip-10-180-40-33

  • Target IP Address: 10.180.40.33

CIS Ubuntu Linux 20.04 LTS Benchmark v2.0.1

  • Level 1 - Server
  • Wednesday, July 24 2024 14:28:11
  • Assessment Duration: 2 seconds

Report generated by the Center for Internet Security's Configuration Assessment Tool (CIS-CAT Pro Assessor) v4.43.0.

For further information, please visit The Center for Internet Security or our Product Support page.

Copyright ©2024, The Center for Internet Security

Content generated on 07/24/2024 14:28 PM. Content last obtained on 07/01/2024 20:33 PM.

Summary

Description Tests Scoring
Pass Fail Error Unkn. Man. Exc. Score Max Percent
1 Initial Setup 0 0 0 0 0 0 0.0 0.0 0%
1.1 Filesystem Configuration 0 0 0 0 0 0 0.0 0.0 0%
1.1.1 Disable unused filesystems 0 0 0 0 0 0 0.0 0.0 0%
1.1.2 Configure /tmp 0 0 0 0 0 0 0.0 0.0 0%
1.1.3 Configure /var 0 0 0 0 0 0 0.0 0.0 0%
1.1.4 Configure /var/tmp 0 0 0 0 0 0 0.0 0.0 0%
1.1.5 Configure /var/log 0 0 0 0 0 0 0.0 0.0 0%
1.1.6 Configure /var/log/audit 0 0 0 0 0 0 0.0 0.0 0%
1.1.7 Configure /home 0 0 0 0 0 0 0.0 0.0 0%
1.1.8 Configure /dev/shm 0 0 0 0 0 0 0.0 0.0 0%
1.2 Filesystem Integrity Checking 0 0 0 0 0 0 0.0 0.0 0%
1.3 Configure Software and Patch Management 0 0 0 0 0 0 0.0 0.0 0%
1.4 Secure Boot Settings 0 0 0 0 0 0 0.0 0.0 0%
1.5 Additional Process Hardening 0 0 0 0 0 0 0.0 0.0 0%
1.6 Mandatory Access Control 0 0 0 0 0 0 0.0 0.0 0%
1.6.1 Configure AppArmor 0 0 0 0 0 0 0.0 0.0 0%
1.7 Command Line Warning Banners 0 0 0 0 0 0 0.0 0.0 0%
1.8 GNOME Display Manager 0 0 0 0 0 0 0.0 0.0 0%
2 Services 0 0 0 0 0 0 0.0 0.0 0%
2.1 Configure Time Synchronization 0 0 0 0 0 0 0.0 0.0 0%
2.1.1 Ensure time synchronization is in use 0 0 0 0 0 0 0.0 0.0 0%
2.1.2 Configure chrony 0 0 0 0 0 0 0.0 0.0 0%
2.1.3 Configure systemd-timesyncd 0 0 0 0 0 0 0.0 0.0 0%
2.1.4 Configure ntp 0 0 0 0 0 0 0.0 0.0 0%
2.2 Special Purpose Services 0 0 0 0 0 0 0.0 0.0 0%
2.3 Service Clients 0 0 0 0 0 0 0.0 0.0 0%
3 Network Configuration 0 0 0 0 0 0 0.0 0.0 0%
3.1 Disable unused network protocols and devices 0 0 0 0 0 0 0.0 0.0 0%
3.2 Network Parameters (Host Only) 0 0 0 0 0 0 0.0 0.0 0%
3.3 Network Parameters (Host and Router) 0 0 0 0 0 0 0.0 0.0 0%
3.4 Firewall Configuration 0 0 0 0 0 0 0.0 0.0 0%
3.4.1 Configure UncomplicatedFirewall 0 0 0 0 0 0 0.0 0.0 0%
3.4.2 Configure nftables 0 0 0 0 0 0 0.0 0.0 0%
3.4.3 Configure iptables 0 0 0 0 0 0 0.0 0.0 0%
3.4.3.1 Configure iptables software 0 0 0 0 0 0 0.0 0.0 0%
3.4.3.2 Configure IPv4 iptables 0 0 0 0 0 0 0.0 0.0 0%
3.4.3.3 Configure IPv6 ip6tables 0 0 0 0 0 0 0.0 0.0 0%
4 Access, Authentication and Authorization 0 0 0 0 0 0 0.0 0.0 0%
4.1 Configure time-based job schedulers 0 0 0 0 0 0 0.0 0.0 0%
4.2 Configure SSH Server 0 0 0 0 0 0 0.0 0.0 0%
4.3 Configure privilege escalation 0 0 0 0 0 0 0.0 0.0 0%
4.4 Configure PAM 0 0 0 0 0 0 0.0 0.0 0%
4.5 User Accounts and Environment 0 0 0 0 0 0 0.0 0.0 0%
4.5.1 Set Shadow Password Suite Parameters 0 0 0 0 0 0 0.0 0.0 0%
5 Logging and Auditing 0 0 0 0 0 0 0.0 0.0 0%
5.1 Configure Logging 0 0 0 0 0 0 0.0 0.0 0%
5.1.1 Configure journald 0 0 0 0 0 0 0.0 0.0 0%
5.1.1.1 Ensure journald is configured to send logs to a remote log host 0 0 0 0 0 0 0.0 0.0 0%
5.1.2 Configure rsyslog 0 0 0 0 0 0 0.0 0.0 0%
5.2 Configure System Accounting (auditd) 0 0 0 0 0 0 0.0 0.0 0%
5.2.1 Ensure auditing is enabled 0 0 0 0 0 0 0.0 0.0 0%
5.2.2 Configure Data Retention 0 0 0 0 0 0 0.0 0.0 0%
5.2.3 Configure auditd rules 0 0 0 0 0 0 0.0 0.0 0%
5.2.4 Configure auditd file access 0 0 0 0 0 0 0.0 0.0 0%
6 System Maintenance 0 0 0 0 0 0 0.0 0.0 0%
6.1 System File Permissions 0 0 0 0 0 0 0.0 0.0 0%
6.2 Local User and Group Settings 0 0 0 0 0 0 0.0 0.0 0%
Total 0 0 0 0 0 0 0.0 0.0 0%

Note: Actual scores are subject to rounding errors. The sum of these values may not result in the exact overall score.

The 'Exc' column only applies to Exceptions that are generated using CIS-CAT Pro Dashboard and is not utilized by CIS-CAT Pro Assessor.

Profiles

This benchmark contains 4 profiles.The Level 1 - Server profile was used for this assessment.

Title Description
Level 1 - Server

Items in this profile intend to:

  • be practical and prudent;
  • provide a clear security benefit; and
  • not inhibit the utility of the technology beyond acceptable means.

This profile is intended for servers.

Show Profile XML
<xccdf:Profile xmlns:xccdf="http://checklists.nist.gov/xccdf/1.2"
               xmlns="http://checklists.nist.gov/xccdf/1.2"
               xmlns:ae="http://benchmarks.cisecurity.org/ae/0.5"
               xmlns:cc6="http://cisecurity.org/20-cc/v6.1"
               xmlns:cc7="http://cisecurity.org/20-cc/v7.0"
               xmlns:cc8="http://cisecurity.org/20-cc/v8.0"
               xmlns:ciscf="https://benchmarks.cisecurity.org/ciscf/1.0"
               xmlns:notes="http://benchmarks.cisecurity.org/notes"
               xmlns:xhtml="http://www.w3.org/1999/xhtml"
               xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
               xmlns:sce="http://open-scap.org/page/SCE_xccdf_stream"
               xmlns:cat="urn:oasis:names:tc:entity:xmlns:xml:catalog"
               xmlns:ds="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:xlink="http://www.w3.org/1999/xlink"
               xmlns:scap-con="http://scap.nist.gov/schema/scap/constructs/1.2"
               xmlns:arf="http://scap.nist.gov/schema/asset-reporting-format/1.1"
               xmlns:dsc="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:ai="http://scap.nist.gov/schema/asset-identification/1.1"
               id="xccdf_org.cisecurity.benchmarks_profile_Level_1_-_Server">
   <xccdf:title xml:lang="en">Level 1 - Server</xccdf:title>
   <xccdf:description xml:lang="en">
      <xhtml:p>Items in this profile intend to:</xhtml:p>
      <xhtml:ul>
         <xhtml:li>be practical and prudent;</xhtml:li>
         <xhtml:li>provide a clear security benefit; and</xhtml:li>
         <xhtml:li>not inhibit the utility of the technology beyond acceptable means.</xhtml:li>
      </xhtml:ul>
      <xhtml:p>This profile is intended for servers.</xhtml:p>
   </xccdf:description>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.1_Ensure_mounting_of_cramfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.2_Ensure_mounting_of_freevxfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.3_Ensure_mounting_of_jffs2_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.4_Ensure_mounting_of_hfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.5_Ensure_mounting_of_hfsplus_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.1_Ensure_tmp_is_a_separate_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.2_Ensure_nodev_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.3_Ensure_noexec_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.4_Ensure_nosuid_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.2_Ensure_nodev_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.3_Ensure_nosuid_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.2_Ensure_nodev_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.3_Ensure_noexec_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.4_Ensure_nosuid_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.2_Ensure_nodev_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.3_Ensure_noexec_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.4_Ensure_nosuid_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.2_Ensure_nodev_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.3_Ensure_noexec_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.4_Ensure_nosuid_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.2_Ensure_nodev_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.3_Ensure_nosuid_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.1_Ensure_nodev_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.2_Ensure_noexec_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.3_Ensure_nosuid_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.9_Disable_Automounting"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.10_Disable_USB_Storage"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.1_Ensure_AIDE_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.2_Ensure_filesystem_integrity_is_regularly_checked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.1_Ensure_updates_patches_and_additional_security_software_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.2_Ensure_package_manager_repositories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.3_Ensure_GPG_keys_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.1_Ensure_bootloader_password_is_set"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.2_Ensure_permissions_on_bootloader_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.3_Ensure_authentication_required_for_single_user_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.1_Ensure_prelink_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.2_Ensure_address_space_layout_randomization_ASLR_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.3_Ensure_ptrace_scope_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.4_Ensure_Automatic_Error_Reporting_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.5_Ensure_core_dumps_are_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.1_Ensure_AppArmor_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.2_Ensure_AppArmor_is_enabled_in_the_bootloader_configuration"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.3_Ensure_all_AppArmor_Profiles_are_in_enforce_or_complain_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.1_Ensure_message_of_the_day_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.2_Ensure_local_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.3_Ensure_remote_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.4_Ensure_permissions_on_etcmotd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.5_Ensure_permissions_on_etcissue_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.6_Ensure_permissions_on_etcissue.net_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.2_Ensure_GDM_login_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.3_Ensure_GDM_disable-user-list_option_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.4_Ensure_GDM_screen_locks_when_the_user_is_idle"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.5_Ensure_GDM_screen_locks_cannot_be_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.6_Ensure_GDM_automatic_mounting_of_removable_media_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.7_Ensure_GDM_disabling_automatic_mounting_of_removable_media_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.8_Ensure_GDM_autorun-never_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.9_Ensure_GDM_autorun-never_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.10_Ensure_XDCMP_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.1.1_Ensure_a_single_time_synchronization_daemon_is_in_use"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.1_Ensure_chrony_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.2_Ensure_chrony_is_running_as_user__chrony"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.3_Ensure_chrony_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.1_Ensure_systemd-timesyncd_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.2_Ensure_systemd-timesyncd_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.1_Ensure_ntp_access_control_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.2_Ensure_ntp_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.3_Ensure_ntp_is_running_as_user_ntp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.4_Ensure_ntp_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.2_Ensure_Avahi_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.3_Ensure_CUPS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.4_Ensure_DHCP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.5_Ensure_LDAP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.6_Ensure_NFS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.7_Ensure_DNS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.8_Ensure_FTP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.9_Ensure_HTTP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.10_Ensure_IMAP_and_POP3_server_are_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.11_Ensure_Samba_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.12_Ensure_HTTP_Proxy_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.13_Ensure_SNMP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.14_Ensure_NIS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.15_Ensure_dnsmasq_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.16_Ensure_mail_transfer_agent_is_configured_for_local-only_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.17_Ensure_rsync_service_is_either_not_installed_or_is_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.1_Ensure_NIS_Client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.2_Ensure_rsh_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.3_Ensure_talk_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.4_Ensure_telnet_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.5_Ensure_LDAP_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.6_Ensure__RPC_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.4_Ensure_nonessential_services_are_removed_or_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.1_Ensure_IPv6_status_is_identified"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.2_Ensure_wireless_interfaces_are_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.3_Ensure_bluetooth_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.1_Ensure_packet_redirect_sending_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.2_Ensure_IP_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.1_Ensure_source_routed_packets_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.2_Ensure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.3_Ensure_secure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.4_Ensure_suspicious_packets_are_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.5_Ensure_broadcast_ICMP_requests_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.6_Ensure_bogus_ICMP_responses_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.7_Ensure_Reverse_Path_Filtering_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.8_Ensure_TCP_SYN_Cookies_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.9_Ensure_IPv6_router_advertisements_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.1_Ensure_ufw_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.2_Ensure_iptables-persistent_is_not_installed_with_ufw"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.3_Ensure_ufw_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.4_Ensure_ufw_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.5_Ensure_ufw_outbound_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.6_Ensure_ufw_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.7_Ensure_ufw_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.1_Ensure_nftables_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.2_Ensure_ufw_is_uninstalled_or_disabled_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.3_Ensure_iptables_are_flushed_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.4_Ensure_a_nftables_table_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.5_Ensure_nftables_base_chains_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.6_Ensure_nftables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.7_Ensure_nftables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.8_Ensure_nftables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.9_Ensure_nftables_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.10_Ensure_nftables_rules_are_permanent"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.1_Ensure_iptables_packages_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.2_Ensure_nftables_is_not_installed_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.3_Ensure_ufw_is_uninstalled_or_disabled_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.1_Ensure_iptables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.2_Ensure_iptables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.3_Ensure_iptables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.4_Ensure_iptables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.1_Ensure_ip6tables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.2_Ensure_ip6tables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.3_Ensure_ip6tables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.4_Ensure_ip6tables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.1_Ensure_cron_daemon_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.2_Ensure_permissions_on_etccrontab_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.3_Ensure_permissions_on_etccron.hourly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.4_Ensure_permissions_on_etccron.daily_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.5_Ensure_permissions_on_etccron.weekly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.6_Ensure_permissions_on_etccron.monthly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.7_Ensure_permissions_on_etccron.d_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.8_Ensure_cron_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.9_Ensure_at_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.1_Ensure_permissions_on_etcsshsshd_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.2_Ensure_permissions_on_SSH_private_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.3_Ensure_permissions_on_SSH_public_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.4_Ensure_SSH_access_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.5_Ensure_SSH_LogLevel_is_appropriate"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.6_Ensure_SSH_PAM_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.7_Ensure_SSH_root_login_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.8_Ensure_SSH_HostbasedAuthentication_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.9_Ensure_SSH_PermitEmptyPasswords_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.10_Ensure_SSH_PermitUserEnvironment_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.11_Ensure_SSH_IgnoreRhosts_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.13_Ensure_only_strong_Ciphers_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.14_Ensure_only_strong_MAC_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.15_Ensure_only_strong_Key_Exchange_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.17_Ensure_SSH_warning_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.18_Ensure_SSH_MaxAuthTries_is_set_to_4_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.19_Ensure_SSH_MaxStartups_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.20_Ensure_SSH_LoginGraceTime_is_set_to_one_minute_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.21_Ensure_SSH_MaxSessions_is_set_to_10_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.22_Ensure_SSH_Idle_Timeout_Interval_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.1_Ensure_sudo_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.2_Ensure_sudo_commands_use_pty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.3_Ensure_sudo_log_file_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.5_Ensure_re-authentication_for_privilege_escalation_is_not_disabled_globally"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.6_Ensure_sudo_authentication_timeout_is_configured_correctly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.7_Ensure_access_to_the_su_command_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.1_Ensure_password_creation_requirements_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.2_Ensure_lockout_for_failed_password_attempts_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.3_Ensure_password_reuse_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.4_Ensure_strong_password_hashing_algorithm_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.5_Ensure_all_current_passwords_uses_the_configured_hashing_algorithm"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.1_Ensure_minimum_days_between_password_changes_is__configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.2_Ensure_password_expiration_is_365_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.3_Ensure_password_expiration_warning_days_is_7_or_more"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.4_Ensure_inactive_password_lock_is_30_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.5_Ensure_all_users_last_password_change_date_is_in_the_past"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.6_Ensure_the_number_of_changed_characters_in_a_new_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.7_Ensure_preventing_the_use_of_dictionary_words_for_passwords_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.2_Ensure_system_accounts_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.3_Ensure_default_group_for_the_root_account_is_GID_0"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.4_Ensure_default_user_umask_is_027_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.5_Ensure_default_user_shell_timeout_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.7_Ensure_maximum_number_of_same_consecutive_characters_in_a_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.1_Ensure_systemd-journal-remote_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.2_Ensure_systemd-journal-remote_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.3_Ensure_systemd-journal-remote_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.4_Ensure_journald_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.2_Ensure_journald_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.3_Ensure_journald_is_configured_to_compress_large_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.4_Ensure_journald_is_configured_to_write_logfiles_to_persistent_disk"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.5_Ensure_journald_is_not_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.6_Ensure_journald_log_rotation_is_configured_per_site_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.7_Ensure_journald_default_file_permissions_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.1_Ensure_rsyslog_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.2_Ensure_rsyslog_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.3_Ensure_journald_is_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.4_Ensure_rsyslog_default_file_permissions_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.5_Ensure_logging_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.6_Ensure_rsyslog_is_configured_to_send_logs_to_a_remote_log_host"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.7_Ensure_rsyslog_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.3_Ensure_all_logfiles_have_appropriate_access_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.11_Ensure_cryptographic_mechanisms_are_used_to_protect_the_integrity_of_audit_tools"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.1_Ensure_permissions_on_etcpasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.2_Ensure_permissions_on_etcpasswd-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.3_Ensure_permissions_on_etcgroup_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.4_Ensure_permissions_on_etcgroup-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.5_Ensure_permissions_on_etcshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.6_Ensure_permissions_on_etcshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.7_Ensure_permissions_on_etcgshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.8_Ensure_permissions_on_etcgshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.9_Ensure_permissions_on_etcshells_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.10_Ensure_permissions_on_etcopasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.11_Ensure_world_writable_files_and_directories_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.12_Ensure_no_unowned_or_ungrouped_files_or_directories_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.13_Ensure_SUID_and_SGID_files_are_reviewed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.1_Ensure_accounts_in_etcpasswd_use_shadowed_passwords"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.2_Ensure_etcshadow_password_fields_are_not_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.3_Ensure_all_groups_in_etcpasswd_exist_in_etcgroup"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.4_Ensure_shadow_group_is_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.5_Ensure_no_duplicate_UIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.6_Ensure_no_duplicate_GIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.7_Ensure_no_duplicate_user_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.8_Ensure_no_duplicate_group_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.9_Ensure_root_PATH_Integrity"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.10_Ensure_root_is_the_only_UID_0_account"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.11_Ensure_local_interactive_user_home_directories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.12_Ensure_local_interactive_user_dot_files_access_is_configured"
                 selected="true"/>
</xccdf:Profile>
Level 2 - Server

This profile extends the "Level 1 - Server" profile. Items in this profile exhibit one or more of the following characteristics:

  • are intended for environments or use cases where security is paramount.
  • acts as defense in depth measure.
  • may negatively inhibit the utility or performance of the technology.

This profile is intended for servers.

Show Profile XML
<xccdf:Profile xmlns:xccdf="http://checklists.nist.gov/xccdf/1.2"
               xmlns="http://checklists.nist.gov/xccdf/1.2"
               xmlns:ae="http://benchmarks.cisecurity.org/ae/0.5"
               xmlns:cc6="http://cisecurity.org/20-cc/v6.1"
               xmlns:cc7="http://cisecurity.org/20-cc/v7.0"
               xmlns:cc8="http://cisecurity.org/20-cc/v8.0"
               xmlns:ciscf="https://benchmarks.cisecurity.org/ciscf/1.0"
               xmlns:notes="http://benchmarks.cisecurity.org/notes"
               xmlns:xhtml="http://www.w3.org/1999/xhtml"
               xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
               xmlns:sce="http://open-scap.org/page/SCE_xccdf_stream"
               xmlns:cat="urn:oasis:names:tc:entity:xmlns:xml:catalog"
               xmlns:ds="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:xlink="http://www.w3.org/1999/xlink"
               xmlns:scap-con="http://scap.nist.gov/schema/scap/constructs/1.2"
               xmlns:arf="http://scap.nist.gov/schema/asset-reporting-format/1.1"
               xmlns:dsc="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:ai="http://scap.nist.gov/schema/asset-identification/1.1"
               id="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Server">
   <xccdf:title xml:lang="en">Level 2 - Server</xccdf:title>
   <xccdf:description xml:lang="en">
      <xhtml:p>This profile extends the "Level 1 - Server" profile. Items in this profile exhibit one or more of the following characteristics:</xhtml:p>
      <xhtml:ul>
         <xhtml:li>are intended for environments or use cases where security is paramount.</xhtml:li>
         <xhtml:li>acts as defense in depth measure.</xhtml:li>
         <xhtml:li>may negatively inhibit the utility or performance of the technology.</xhtml:li>
      </xhtml:ul>
      <xhtml:p>This profile is intended for servers.</xhtml:p>
   </xccdf:description>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.1_Ensure_mounting_of_cramfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.2_Ensure_mounting_of_freevxfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.3_Ensure_mounting_of_jffs2_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.4_Ensure_mounting_of_hfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.5_Ensure_mounting_of_hfsplus_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.6_Ensure_mounting_of_squashfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.7_Ensure_mounting_of_udf_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.1_Ensure_tmp_is_a_separate_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.2_Ensure_nodev_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.3_Ensure_noexec_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.4_Ensure_nosuid_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.1_Ensure_separate_partition_exists_for_var"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.2_Ensure_nodev_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.3_Ensure_nosuid_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.1_Ensure_separate_partition_exists_for_vartmp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.2_Ensure_nodev_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.3_Ensure_noexec_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.4_Ensure_nosuid_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.1_Ensure_separate_partition_exists_for_varlog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.2_Ensure_nodev_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.3_Ensure_noexec_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.4_Ensure_nosuid_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.1_Ensure_separate_partition_exists_for_varlogaudit"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.2_Ensure_nodev_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.3_Ensure_noexec_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.4_Ensure_nosuid_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.1_Ensure_separate_partition_exists_for_home"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.2_Ensure_nodev_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.3_Ensure_nosuid_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.1_Ensure_nodev_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.2_Ensure_noexec_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.3_Ensure_nosuid_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.9_Disable_Automounting"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.10_Disable_USB_Storage"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.1_Ensure_AIDE_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.2_Ensure_filesystem_integrity_is_regularly_checked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.1_Ensure_updates_patches_and_additional_security_software_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.2_Ensure_package_manager_repositories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.3_Ensure_GPG_keys_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.1_Ensure_bootloader_password_is_set"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.2_Ensure_permissions_on_bootloader_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.3_Ensure_authentication_required_for_single_user_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.1_Ensure_prelink_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.2_Ensure_address_space_layout_randomization_ASLR_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.3_Ensure_ptrace_scope_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.4_Ensure_Automatic_Error_Reporting_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.5_Ensure_core_dumps_are_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.1_Ensure_AppArmor_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.2_Ensure_AppArmor_is_enabled_in_the_bootloader_configuration"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.3_Ensure_all_AppArmor_Profiles_are_in_enforce_or_complain_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.4_Ensure_all_AppArmor_Profiles_are_enforcing"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.1_Ensure_message_of_the_day_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.2_Ensure_local_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.3_Ensure_remote_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.4_Ensure_permissions_on_etcmotd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.5_Ensure_permissions_on_etcissue_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.6_Ensure_permissions_on_etcissue.net_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.1_Ensure_GNOME_Display_Manager_is_removed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.2_Ensure_GDM_login_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.3_Ensure_GDM_disable-user-list_option_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.4_Ensure_GDM_screen_locks_when_the_user_is_idle"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.5_Ensure_GDM_screen_locks_cannot_be_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.6_Ensure_GDM_automatic_mounting_of_removable_media_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.7_Ensure_GDM_disabling_automatic_mounting_of_removable_media_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.8_Ensure_GDM_autorun-never_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.9_Ensure_GDM_autorun-never_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.10_Ensure_XDCMP_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.1.1_Ensure_a_single_time_synchronization_daemon_is_in_use"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.1_Ensure_chrony_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.2_Ensure_chrony_is_running_as_user__chrony"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.3_Ensure_chrony_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.1_Ensure_systemd-timesyncd_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.2_Ensure_systemd-timesyncd_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.1_Ensure_ntp_access_control_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.2_Ensure_ntp_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.3_Ensure_ntp_is_running_as_user_ntp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.4_Ensure_ntp_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.1_Ensure_X_Window_System_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.2_Ensure_Avahi_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.3_Ensure_CUPS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.4_Ensure_DHCP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.5_Ensure_LDAP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.6_Ensure_NFS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.7_Ensure_DNS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.8_Ensure_FTP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.9_Ensure_HTTP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.10_Ensure_IMAP_and_POP3_server_are_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.11_Ensure_Samba_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.12_Ensure_HTTP_Proxy_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.13_Ensure_SNMP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.14_Ensure_NIS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.15_Ensure_dnsmasq_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.16_Ensure_mail_transfer_agent_is_configured_for_local-only_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.17_Ensure_rsync_service_is_either_not_installed_or_is_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.1_Ensure_NIS_Client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.2_Ensure_rsh_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.3_Ensure_talk_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.4_Ensure_telnet_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.5_Ensure_LDAP_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.6_Ensure__RPC_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.4_Ensure_nonessential_services_are_removed_or_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.1_Ensure_IPv6_status_is_identified"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.2_Ensure_wireless_interfaces_are_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.3_Ensure_bluetooth_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.4_Ensure_DCCP_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.5_Ensure_SCTP_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.6_Ensure_RDS_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.7_Ensure_TIPC_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.1_Ensure_packet_redirect_sending_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.2_Ensure_IP_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.1_Ensure_source_routed_packets_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.2_Ensure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.3_Ensure_secure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.4_Ensure_suspicious_packets_are_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.5_Ensure_broadcast_ICMP_requests_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.6_Ensure_bogus_ICMP_responses_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.7_Ensure_Reverse_Path_Filtering_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.8_Ensure_TCP_SYN_Cookies_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.9_Ensure_IPv6_router_advertisements_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.1_Ensure_ufw_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.2_Ensure_iptables-persistent_is_not_installed_with_ufw"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.3_Ensure_ufw_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.4_Ensure_ufw_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.5_Ensure_ufw_outbound_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.6_Ensure_ufw_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.7_Ensure_ufw_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.1_Ensure_nftables_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.2_Ensure_ufw_is_uninstalled_or_disabled_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.3_Ensure_iptables_are_flushed_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.4_Ensure_a_nftables_table_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.5_Ensure_nftables_base_chains_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.6_Ensure_nftables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.7_Ensure_nftables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.8_Ensure_nftables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.9_Ensure_nftables_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.10_Ensure_nftables_rules_are_permanent"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.1_Ensure_iptables_packages_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.2_Ensure_nftables_is_not_installed_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.3_Ensure_ufw_is_uninstalled_or_disabled_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.1_Ensure_iptables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.2_Ensure_iptables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.3_Ensure_iptables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.4_Ensure_iptables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.1_Ensure_ip6tables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.2_Ensure_ip6tables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.3_Ensure_ip6tables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.4_Ensure_ip6tables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.1_Ensure_cron_daemon_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.2_Ensure_permissions_on_etccrontab_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.3_Ensure_permissions_on_etccron.hourly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.4_Ensure_permissions_on_etccron.daily_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.5_Ensure_permissions_on_etccron.weekly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.6_Ensure_permissions_on_etccron.monthly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.7_Ensure_permissions_on_etccron.d_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.8_Ensure_cron_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.9_Ensure_at_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.1_Ensure_permissions_on_etcsshsshd_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.2_Ensure_permissions_on_SSH_private_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.3_Ensure_permissions_on_SSH_public_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.4_Ensure_SSH_access_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.5_Ensure_SSH_LogLevel_is_appropriate"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.6_Ensure_SSH_PAM_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.7_Ensure_SSH_root_login_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.8_Ensure_SSH_HostbasedAuthentication_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.9_Ensure_SSH_PermitEmptyPasswords_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.10_Ensure_SSH_PermitUserEnvironment_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.11_Ensure_SSH_IgnoreRhosts_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.12_Ensure_SSH_X11_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.13_Ensure_only_strong_Ciphers_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.14_Ensure_only_strong_MAC_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.15_Ensure_only_strong_Key_Exchange_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.16_Ensure_SSH_AllowTcpForwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.17_Ensure_SSH_warning_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.18_Ensure_SSH_MaxAuthTries_is_set_to_4_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.19_Ensure_SSH_MaxStartups_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.20_Ensure_SSH_LoginGraceTime_is_set_to_one_minute_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.21_Ensure_SSH_MaxSessions_is_set_to_10_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.22_Ensure_SSH_Idle_Timeout_Interval_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.1_Ensure_sudo_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.2_Ensure_sudo_commands_use_pty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.3_Ensure_sudo_log_file_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.4_Ensure_users_must_provide_password_for_privilege_escalation"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.5_Ensure_re-authentication_for_privilege_escalation_is_not_disabled_globally"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.6_Ensure_sudo_authentication_timeout_is_configured_correctly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.7_Ensure_access_to_the_su_command_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.1_Ensure_password_creation_requirements_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.2_Ensure_lockout_for_failed_password_attempts_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.3_Ensure_password_reuse_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.4_Ensure_strong_password_hashing_algorithm_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.5_Ensure_all_current_passwords_uses_the_configured_hashing_algorithm"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.1_Ensure_minimum_days_between_password_changes_is__configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.2_Ensure_password_expiration_is_365_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.3_Ensure_password_expiration_warning_days_is_7_or_more"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.4_Ensure_inactive_password_lock_is_30_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.5_Ensure_all_users_last_password_change_date_is_in_the_past"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.6_Ensure_the_number_of_changed_characters_in_a_new_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.7_Ensure_preventing_the_use_of_dictionary_words_for_passwords_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.2_Ensure_system_accounts_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.3_Ensure_default_group_for_the_root_account_is_GID_0"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.4_Ensure_default_user_umask_is_027_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.5_Ensure_default_user_shell_timeout_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.6_Ensure_nologin_is_not_listed_in_etcshells"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.7_Ensure_maximum_number_of_same_consecutive_characters_in_a_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.1_Ensure_systemd-journal-remote_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.2_Ensure_systemd-journal-remote_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.3_Ensure_systemd-journal-remote_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.4_Ensure_journald_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.2_Ensure_journald_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.3_Ensure_journald_is_configured_to_compress_large_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.4_Ensure_journald_is_configured_to_write_logfiles_to_persistent_disk"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.5_Ensure_journald_is_not_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.6_Ensure_journald_log_rotation_is_configured_per_site_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.7_Ensure_journald_default_file_permissions_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.1_Ensure_rsyslog_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.2_Ensure_rsyslog_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.3_Ensure_journald_is_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.4_Ensure_rsyslog_default_file_permissions_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.5_Ensure_logging_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.6_Ensure_rsyslog_is_configured_to_send_logs_to_a_remote_log_host"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.7_Ensure_rsyslog_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.3_Ensure_all_logfiles_have_appropriate_access_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.1_Ensure_auditd_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.2_Ensure_auditd_service_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.3_Ensure_auditing_for_processes_that_start_prior_to_auditd_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.4_Ensure_audit_backlog_limit_is_sufficient"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.1_Ensure_audit_log_storage_size_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.2_Ensure_audit_logs_are_not_automatically_deleted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.3_Ensure_system_is_disabled_when_audit_logs_are_full"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.1_Ensure_changes_to_system_administration_scope_sudoers_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.2_Ensure_actions_as_another_user_are_always_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.3_Ensure_events_that_modify_the_sudo_log_file_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.4_Ensure_events_that_modify_date_and_time_information_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.5_Ensure_events_that_modify_the_systems_network_environment_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.6_Ensure_use_of_privileged_commands_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.7_Ensure_unsuccessful_file_access_attempts_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.8_Ensure_events_that_modify_usergroup_information_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.9_Ensure_discretionary_access_control_permission_modification_events_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.10_Ensure_successful_file_system_mounts_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.11_Ensure_session_initiation_information_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.12_Ensure_login_and_logout_events_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.13_Ensure_file_deletion_events_by_users_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.14_Ensure_events_that_modify_the_systems_Mandatory_Access_Controls_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.15_Ensure_successful_and_unsuccessful_attempts_to_use_the_chcon_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.16_Ensure_successful_and_unsuccessful_attempts_to_use_the_setfacl_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.17_Ensure_successful_and_unsuccessful_attempts_to_use_the_chacl_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.18_Ensure_successful_and_unsuccessful_attempts_to_use_the_usermod_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.19_Ensure_kernel_module_loading_unloading_and_modification_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.20_Ensure_the_audit_configuration_is_immutable"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.21_Ensure_the_running_and_on_disk_configuration_is_the_same"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.1_Ensure_audit_log_files_are_mode_0640_or_less_permissive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.2_Ensure_only_authorized_users_own_audit_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.3_Ensure_only_authorized_groups_are_assigned_ownership_of_audit_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.4_Ensure_the_audit_log_directory_is_0750_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.5_Ensure_audit_configuration_files_are_640_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.6_Ensure_audit_configuration_files_are_owned_by_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.7_Ensure_audit_configuration_files_belong_to_group_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.8_Ensure_audit_tools_are_755_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.9_Ensure_audit_tools_are_owned_by_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.10_Ensure_audit_tools_belong_to_group_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.11_Ensure_cryptographic_mechanisms_are_used_to_protect_the_integrity_of_audit_tools"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.1_Ensure_permissions_on_etcpasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.2_Ensure_permissions_on_etcpasswd-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.3_Ensure_permissions_on_etcgroup_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.4_Ensure_permissions_on_etcgroup-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.5_Ensure_permissions_on_etcshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.6_Ensure_permissions_on_etcshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.7_Ensure_permissions_on_etcgshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.8_Ensure_permissions_on_etcgshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.9_Ensure_permissions_on_etcshells_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.10_Ensure_permissions_on_etcopasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.11_Ensure_world_writable_files_and_directories_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.12_Ensure_no_unowned_or_ungrouped_files_or_directories_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.13_Ensure_SUID_and_SGID_files_are_reviewed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.1_Ensure_accounts_in_etcpasswd_use_shadowed_passwords"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.2_Ensure_etcshadow_password_fields_are_not_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.3_Ensure_all_groups_in_etcpasswd_exist_in_etcgroup"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.4_Ensure_shadow_group_is_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.5_Ensure_no_duplicate_UIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.6_Ensure_no_duplicate_GIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.7_Ensure_no_duplicate_user_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.8_Ensure_no_duplicate_group_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.9_Ensure_root_PATH_Integrity"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.10_Ensure_root_is_the_only_UID_0_account"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.11_Ensure_local_interactive_user_home_directories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.12_Ensure_local_interactive_user_dot_files_access_is_configured"
                 selected="true"/>
</xccdf:Profile>
Level 1 - Workstation

Items in this profile intend to:

  • be practical and prudent;
  • provide a clear security benefit; and
  • not inhibit the utility of the technology beyond acceptable means.

This profile is intended for workstations.

Show Profile XML
<xccdf:Profile xmlns:xccdf="http://checklists.nist.gov/xccdf/1.2"
               xmlns="http://checklists.nist.gov/xccdf/1.2"
               xmlns:ae="http://benchmarks.cisecurity.org/ae/0.5"
               xmlns:cc6="http://cisecurity.org/20-cc/v6.1"
               xmlns:cc7="http://cisecurity.org/20-cc/v7.0"
               xmlns:cc8="http://cisecurity.org/20-cc/v8.0"
               xmlns:ciscf="https://benchmarks.cisecurity.org/ciscf/1.0"
               xmlns:notes="http://benchmarks.cisecurity.org/notes"
               xmlns:xhtml="http://www.w3.org/1999/xhtml"
               xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
               xmlns:sce="http://open-scap.org/page/SCE_xccdf_stream"
               xmlns:cat="urn:oasis:names:tc:entity:xmlns:xml:catalog"
               xmlns:ds="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:xlink="http://www.w3.org/1999/xlink"
               xmlns:scap-con="http://scap.nist.gov/schema/scap/constructs/1.2"
               xmlns:arf="http://scap.nist.gov/schema/asset-reporting-format/1.1"
               xmlns:dsc="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:ai="http://scap.nist.gov/schema/asset-identification/1.1"
               id="xccdf_org.cisecurity.benchmarks_profile_Level_1_-_Workstation">
   <xccdf:title xml:lang="en">Level 1 - Workstation</xccdf:title>
   <xccdf:description xml:lang="en">
      <xhtml:p>Items in this profile intend to:</xhtml:p>
      <xhtml:ul>
         <xhtml:li>be practical and prudent;</xhtml:li>
         <xhtml:li>provide a clear security benefit; and</xhtml:li>
         <xhtml:li>not inhibit the utility of the technology beyond acceptable means.</xhtml:li>
      </xhtml:ul>
      <xhtml:p>This profile is intended for workstations.</xhtml:p>
   </xccdf:description>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.1_Ensure_mounting_of_cramfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.2_Ensure_mounting_of_freevxfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.3_Ensure_mounting_of_jffs2_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.4_Ensure_mounting_of_hfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.5_Ensure_mounting_of_hfsplus_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.1_Ensure_tmp_is_a_separate_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.2_Ensure_nodev_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.3_Ensure_noexec_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.4_Ensure_nosuid_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.2_Ensure_nodev_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.3_Ensure_nosuid_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.2_Ensure_nodev_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.3_Ensure_noexec_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.4_Ensure_nosuid_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.2_Ensure_nodev_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.3_Ensure_noexec_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.4_Ensure_nosuid_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.2_Ensure_nodev_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.3_Ensure_noexec_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.4_Ensure_nosuid_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.2_Ensure_nodev_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.3_Ensure_nosuid_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.1_Ensure_nodev_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.2_Ensure_noexec_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.3_Ensure_nosuid_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.1_Ensure_AIDE_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.2_Ensure_filesystem_integrity_is_regularly_checked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.1_Ensure_updates_patches_and_additional_security_software_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.2_Ensure_package_manager_repositories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.3_Ensure_GPG_keys_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.1_Ensure_bootloader_password_is_set"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.2_Ensure_permissions_on_bootloader_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.3_Ensure_authentication_required_for_single_user_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.1_Ensure_prelink_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.2_Ensure_address_space_layout_randomization_ASLR_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.3_Ensure_ptrace_scope_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.4_Ensure_Automatic_Error_Reporting_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.5_Ensure_core_dumps_are_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.1_Ensure_AppArmor_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.2_Ensure_AppArmor_is_enabled_in_the_bootloader_configuration"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.3_Ensure_all_AppArmor_Profiles_are_in_enforce_or_complain_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.1_Ensure_message_of_the_day_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.2_Ensure_local_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.3_Ensure_remote_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.4_Ensure_permissions_on_etcmotd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.5_Ensure_permissions_on_etcissue_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.6_Ensure_permissions_on_etcissue.net_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.2_Ensure_GDM_login_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.3_Ensure_GDM_disable-user-list_option_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.4_Ensure_GDM_screen_locks_when_the_user_is_idle"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.5_Ensure_GDM_screen_locks_cannot_be_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.8_Ensure_GDM_autorun-never_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.9_Ensure_GDM_autorun-never_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.10_Ensure_XDCMP_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.1.1_Ensure_a_single_time_synchronization_daemon_is_in_use"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.1_Ensure_chrony_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.2_Ensure_chrony_is_running_as_user__chrony"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.3_Ensure_chrony_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.1_Ensure_systemd-timesyncd_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.2_Ensure_systemd-timesyncd_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.1_Ensure_ntp_access_control_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.2_Ensure_ntp_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.3_Ensure_ntp_is_running_as_user_ntp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.4_Ensure_ntp_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.2_Ensure_Avahi_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.4_Ensure_DHCP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.5_Ensure_LDAP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.6_Ensure_NFS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.7_Ensure_DNS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.8_Ensure_FTP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.9_Ensure_HTTP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.10_Ensure_IMAP_and_POP3_server_are_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.11_Ensure_Samba_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.12_Ensure_HTTP_Proxy_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.13_Ensure_SNMP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.14_Ensure_NIS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.15_Ensure_dnsmasq_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.16_Ensure_mail_transfer_agent_is_configured_for_local-only_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.17_Ensure_rsync_service_is_either_not_installed_or_is_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.1_Ensure_NIS_Client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.2_Ensure_rsh_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.3_Ensure_talk_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.4_Ensure_telnet_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.5_Ensure_LDAP_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.6_Ensure__RPC_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.4_Ensure_nonessential_services_are_removed_or_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.1_Ensure_IPv6_status_is_identified"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.1_Ensure_packet_redirect_sending_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.2_Ensure_IP_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.1_Ensure_source_routed_packets_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.2_Ensure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.3_Ensure_secure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.4_Ensure_suspicious_packets_are_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.5_Ensure_broadcast_ICMP_requests_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.6_Ensure_bogus_ICMP_responses_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.7_Ensure_Reverse_Path_Filtering_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.8_Ensure_TCP_SYN_Cookies_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.9_Ensure_IPv6_router_advertisements_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.1_Ensure_ufw_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.2_Ensure_iptables-persistent_is_not_installed_with_ufw"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.3_Ensure_ufw_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.4_Ensure_ufw_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.5_Ensure_ufw_outbound_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.6_Ensure_ufw_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.7_Ensure_ufw_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.1_Ensure_nftables_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.2_Ensure_ufw_is_uninstalled_or_disabled_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.3_Ensure_iptables_are_flushed_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.4_Ensure_a_nftables_table_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.5_Ensure_nftables_base_chains_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.6_Ensure_nftables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.7_Ensure_nftables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.8_Ensure_nftables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.9_Ensure_nftables_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.10_Ensure_nftables_rules_are_permanent"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.1_Ensure_iptables_packages_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.2_Ensure_nftables_is_not_installed_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.3_Ensure_ufw_is_uninstalled_or_disabled_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.1_Ensure_iptables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.2_Ensure_iptables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.3_Ensure_iptables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.4_Ensure_iptables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.1_Ensure_ip6tables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.2_Ensure_ip6tables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.3_Ensure_ip6tables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.4_Ensure_ip6tables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.1_Ensure_cron_daemon_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.2_Ensure_permissions_on_etccrontab_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.3_Ensure_permissions_on_etccron.hourly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.4_Ensure_permissions_on_etccron.daily_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.5_Ensure_permissions_on_etccron.weekly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.6_Ensure_permissions_on_etccron.monthly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.7_Ensure_permissions_on_etccron.d_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.8_Ensure_cron_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.9_Ensure_at_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.1_Ensure_permissions_on_etcsshsshd_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.2_Ensure_permissions_on_SSH_private_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.3_Ensure_permissions_on_SSH_public_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.4_Ensure_SSH_access_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.5_Ensure_SSH_LogLevel_is_appropriate"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.6_Ensure_SSH_PAM_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.7_Ensure_SSH_root_login_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.8_Ensure_SSH_HostbasedAuthentication_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.9_Ensure_SSH_PermitEmptyPasswords_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.10_Ensure_SSH_PermitUserEnvironment_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.11_Ensure_SSH_IgnoreRhosts_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.12_Ensure_SSH_X11_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.13_Ensure_only_strong_Ciphers_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.14_Ensure_only_strong_MAC_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.15_Ensure_only_strong_Key_Exchange_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.17_Ensure_SSH_warning_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.18_Ensure_SSH_MaxAuthTries_is_set_to_4_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.19_Ensure_SSH_MaxStartups_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.20_Ensure_SSH_LoginGraceTime_is_set_to_one_minute_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.21_Ensure_SSH_MaxSessions_is_set_to_10_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.22_Ensure_SSH_Idle_Timeout_Interval_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.1_Ensure_sudo_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.2_Ensure_sudo_commands_use_pty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.3_Ensure_sudo_log_file_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.5_Ensure_re-authentication_for_privilege_escalation_is_not_disabled_globally"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.6_Ensure_sudo_authentication_timeout_is_configured_correctly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.7_Ensure_access_to_the_su_command_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.1_Ensure_password_creation_requirements_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.2_Ensure_lockout_for_failed_password_attempts_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.3_Ensure_password_reuse_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.4_Ensure_strong_password_hashing_algorithm_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.5_Ensure_all_current_passwords_uses_the_configured_hashing_algorithm"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.1_Ensure_minimum_days_between_password_changes_is__configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.2_Ensure_password_expiration_is_365_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.3_Ensure_password_expiration_warning_days_is_7_or_more"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.4_Ensure_inactive_password_lock_is_30_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.5_Ensure_all_users_last_password_change_date_is_in_the_past"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.6_Ensure_the_number_of_changed_characters_in_a_new_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.7_Ensure_preventing_the_use_of_dictionary_words_for_passwords_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.2_Ensure_system_accounts_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.3_Ensure_default_group_for_the_root_account_is_GID_0"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.4_Ensure_default_user_umask_is_027_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.5_Ensure_default_user_shell_timeout_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.7_Ensure_maximum_number_of_same_consecutive_characters_in_a_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.1_Ensure_systemd-journal-remote_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.2_Ensure_systemd-journal-remote_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.3_Ensure_systemd-journal-remote_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.4_Ensure_journald_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.2_Ensure_journald_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.3_Ensure_journald_is_configured_to_compress_large_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.4_Ensure_journald_is_configured_to_write_logfiles_to_persistent_disk"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.5_Ensure_journald_is_not_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.6_Ensure_journald_log_rotation_is_configured_per_site_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.7_Ensure_journald_default_file_permissions_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.1_Ensure_rsyslog_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.2_Ensure_rsyslog_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.3_Ensure_journald_is_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.4_Ensure_rsyslog_default_file_permissions_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.5_Ensure_logging_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.6_Ensure_rsyslog_is_configured_to_send_logs_to_a_remote_log_host"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.7_Ensure_rsyslog_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.3_Ensure_all_logfiles_have_appropriate_access_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.11_Ensure_cryptographic_mechanisms_are_used_to_protect_the_integrity_of_audit_tools"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.1_Ensure_permissions_on_etcpasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.2_Ensure_permissions_on_etcpasswd-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.3_Ensure_permissions_on_etcgroup_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.4_Ensure_permissions_on_etcgroup-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.5_Ensure_permissions_on_etcshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.6_Ensure_permissions_on_etcshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.7_Ensure_permissions_on_etcgshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.8_Ensure_permissions_on_etcgshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.9_Ensure_permissions_on_etcshells_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.10_Ensure_permissions_on_etcopasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.11_Ensure_world_writable_files_and_directories_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.12_Ensure_no_unowned_or_ungrouped_files_or_directories_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.13_Ensure_SUID_and_SGID_files_are_reviewed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.1_Ensure_accounts_in_etcpasswd_use_shadowed_passwords"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.2_Ensure_etcshadow_password_fields_are_not_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.3_Ensure_all_groups_in_etcpasswd_exist_in_etcgroup"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.4_Ensure_shadow_group_is_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.5_Ensure_no_duplicate_UIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.6_Ensure_no_duplicate_GIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.7_Ensure_no_duplicate_user_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.8_Ensure_no_duplicate_group_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.9_Ensure_root_PATH_Integrity"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.10_Ensure_root_is_the_only_UID_0_account"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.11_Ensure_local_interactive_user_home_directories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.12_Ensure_local_interactive_user_dot_files_access_is_configured"
                 selected="true"/>
</xccdf:Profile>
Level 2 - Workstation

This profile extends the "Level 1 - Workstation" profile. Items in this profile exhibit one or more of the following characteristics:

  • are intended for environments or use cases where security is paramount.
  • acts as defense in depth measure.
  • may negatively inhibit the utility or performance of the technology.

This profile is intended for workstations.

Show Profile XML
<xccdf:Profile xmlns:xccdf="http://checklists.nist.gov/xccdf/1.2"
               xmlns="http://checklists.nist.gov/xccdf/1.2"
               xmlns:ae="http://benchmarks.cisecurity.org/ae/0.5"
               xmlns:cc6="http://cisecurity.org/20-cc/v6.1"
               xmlns:cc7="http://cisecurity.org/20-cc/v7.0"
               xmlns:cc8="http://cisecurity.org/20-cc/v8.0"
               xmlns:ciscf="https://benchmarks.cisecurity.org/ciscf/1.0"
               xmlns:notes="http://benchmarks.cisecurity.org/notes"
               xmlns:xhtml="http://www.w3.org/1999/xhtml"
               xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
               xmlns:sce="http://open-scap.org/page/SCE_xccdf_stream"
               xmlns:cat="urn:oasis:names:tc:entity:xmlns:xml:catalog"
               xmlns:ds="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:xlink="http://www.w3.org/1999/xlink"
               xmlns:scap-con="http://scap.nist.gov/schema/scap/constructs/1.2"
               xmlns:arf="http://scap.nist.gov/schema/asset-reporting-format/1.1"
               xmlns:dsc="http://scap.nist.gov/schema/scap/source/1.2"
               xmlns:ai="http://scap.nist.gov/schema/asset-identification/1.1"
               id="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Workstation">
   <xccdf:title xml:lang="en">Level 2 - Workstation</xccdf:title>
   <xccdf:description xml:lang="en">
      <xhtml:p>This profile extends the "Level 1 - Workstation" profile. Items in this profile exhibit one or more of the following characteristics:</xhtml:p>
      <xhtml:ul>
         <xhtml:li>are intended for environments or use cases where security is paramount.</xhtml:li>
         <xhtml:li>acts as defense in depth measure.</xhtml:li>
         <xhtml:li>may negatively inhibit the utility or performance of the technology.</xhtml:li>
      </xhtml:ul>
      <xhtml:p>This profile is intended for workstations.</xhtml:p>
   </xccdf:description>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.1_Ensure_mounting_of_cramfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.2_Ensure_mounting_of_freevxfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.3_Ensure_mounting_of_jffs2_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.4_Ensure_mounting_of_hfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.5_Ensure_mounting_of_hfsplus_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.6_Ensure_mounting_of_squashfs_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.1.7_Ensure_mounting_of_udf_filesystems_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.1_Ensure_tmp_is_a_separate_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.2_Ensure_nodev_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.3_Ensure_noexec_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.2.4_Ensure_nosuid_option_set_on_tmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.1_Ensure_separate_partition_exists_for_var"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.2_Ensure_nodev_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.3.3_Ensure_nosuid_option_set_on_var_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.1_Ensure_separate_partition_exists_for_vartmp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.2_Ensure_nodev_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.3_Ensure_noexec_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.4.4_Ensure_nosuid_option_set_on_vartmp_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.1_Ensure_separate_partition_exists_for_varlog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.2_Ensure_nodev_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.3_Ensure_noexec_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.5.4_Ensure_nosuid_option_set_on_varlog_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.1_Ensure_separate_partition_exists_for_varlogaudit"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.2_Ensure_nodev_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.3_Ensure_noexec_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.6.4_Ensure_nosuid_option_set_on_varlogaudit_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.1_Ensure_separate_partition_exists_for_home"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.2_Ensure_nodev_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.7.3_Ensure_nosuid_option_set_on_home_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.1_Ensure_nodev_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.2_Ensure_noexec_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.8.3_Ensure_nosuid_option_set_on_devshm_partition"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.9_Disable_Automounting"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.1.10_Disable_USB_Storage"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.1_Ensure_AIDE_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.2.2_Ensure_filesystem_integrity_is_regularly_checked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.1_Ensure_updates_patches_and_additional_security_software_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.2_Ensure_package_manager_repositories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.3.3_Ensure_GPG_keys_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.1_Ensure_bootloader_password_is_set"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.2_Ensure_permissions_on_bootloader_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.4.3_Ensure_authentication_required_for_single_user_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.1_Ensure_prelink_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.2_Ensure_address_space_layout_randomization_ASLR_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.3_Ensure_ptrace_scope_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.4_Ensure_Automatic_Error_Reporting_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.5.5_Ensure_core_dumps_are_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.1_Ensure_AppArmor_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.2_Ensure_AppArmor_is_enabled_in_the_bootloader_configuration"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.3_Ensure_all_AppArmor_Profiles_are_in_enforce_or_complain_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.6.1.4_Ensure_all_AppArmor_Profiles_are_enforcing"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.1_Ensure_message_of_the_day_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.2_Ensure_local_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.3_Ensure_remote_login_warning_banner_is_configured_properly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.4_Ensure_permissions_on_etcmotd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.5_Ensure_permissions_on_etcissue_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.7.6_Ensure_permissions_on_etcissue.net_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.2_Ensure_GDM_login_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.3_Ensure_GDM_disable-user-list_option_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.4_Ensure_GDM_screen_locks_when_the_user_is_idle"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.5_Ensure_GDM_screen_locks_cannot_be_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.6_Ensure_GDM_automatic_mounting_of_removable_media_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.7_Ensure_GDM_disabling_automatic_mounting_of_removable_media_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.8_Ensure_GDM_autorun-never_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.9_Ensure_GDM_autorun-never_is_not_overridden"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_1.8.10_Ensure_XDCMP_is_not_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.1.1_Ensure_a_single_time_synchronization_daemon_is_in_use"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.1_Ensure_chrony_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.2_Ensure_chrony_is_running_as_user__chrony"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.2.3_Ensure_chrony_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.1_Ensure_systemd-timesyncd_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.3.2_Ensure_systemd-timesyncd_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.1_Ensure_ntp_access_control_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.2_Ensure_ntp_is_configured_with_authorized_timeserver"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.3_Ensure_ntp_is_running_as_user_ntp"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.1.4.4_Ensure_ntp_is_enabled_and_running"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.2_Ensure_Avahi_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.3_Ensure_CUPS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.4_Ensure_DHCP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.5_Ensure_LDAP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.6_Ensure_NFS_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.7_Ensure_DNS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.8_Ensure_FTP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.9_Ensure_HTTP_server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.10_Ensure_IMAP_and_POP3_server_are_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.11_Ensure_Samba_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.12_Ensure_HTTP_Proxy_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.13_Ensure_SNMP_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.14_Ensure_NIS_Server_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.15_Ensure_dnsmasq_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.16_Ensure_mail_transfer_agent_is_configured_for_local-only_mode"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.2.17_Ensure_rsync_service_is_either_not_installed_or_is_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.1_Ensure_NIS_Client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.2_Ensure_rsh_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.3_Ensure_talk_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.4_Ensure_telnet_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.5_Ensure_LDAP_client_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.3.6_Ensure__RPC_is_not_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_2.4_Ensure_nonessential_services_are_removed_or_masked"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.1_Ensure_IPv6_status_is_identified"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.4_Ensure_DCCP_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.5_Ensure_SCTP_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.6_Ensure_RDS_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.1.7_Ensure_TIPC_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.1_Ensure_packet_redirect_sending_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.2.2_Ensure_IP_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.1_Ensure_source_routed_packets_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.2_Ensure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.3_Ensure_secure_ICMP_redirects_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.4_Ensure_suspicious_packets_are_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.5_Ensure_broadcast_ICMP_requests_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.6_Ensure_bogus_ICMP_responses_are_ignored"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.7_Ensure_Reverse_Path_Filtering_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.8_Ensure_TCP_SYN_Cookies_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.3.9_Ensure_IPv6_router_advertisements_are_not_accepted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.1_Ensure_ufw_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.2_Ensure_iptables-persistent_is_not_installed_with_ufw"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.3_Ensure_ufw_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.4_Ensure_ufw_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.5_Ensure_ufw_outbound_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.6_Ensure_ufw_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.1.7_Ensure_ufw_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.1_Ensure_nftables_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.2_Ensure_ufw_is_uninstalled_or_disabled_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.3_Ensure_iptables_are_flushed_with_nftables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.4_Ensure_a_nftables_table_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.5_Ensure_nftables_base_chains_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.6_Ensure_nftables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.7_Ensure_nftables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.8_Ensure_nftables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.9_Ensure_nftables_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.2.10_Ensure_nftables_rules_are_permanent"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.1_Ensure_iptables_packages_are_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.2_Ensure_nftables_is_not_installed_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.1.3_Ensure_ufw_is_uninstalled_or_disabled_with_iptables"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.1_Ensure_iptables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.2_Ensure_iptables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.3_Ensure_iptables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.2.4_Ensure_iptables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.1_Ensure_ip6tables_default_deny_firewall_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.2_Ensure_ip6tables_loopback_traffic_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.3_Ensure_ip6tables_outbound_and_established_connections_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_3.4.3.3.4_Ensure_ip6tables_firewall_rules_exist_for_all_open_ports"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.1_Ensure_cron_daemon_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.2_Ensure_permissions_on_etccrontab_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.3_Ensure_permissions_on_etccron.hourly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.4_Ensure_permissions_on_etccron.daily_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.5_Ensure_permissions_on_etccron.weekly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.6_Ensure_permissions_on_etccron.monthly_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.7_Ensure_permissions_on_etccron.d_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.8_Ensure_cron_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.1.9_Ensure_at_is_restricted_to_authorized_users"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.1_Ensure_permissions_on_etcsshsshd_config_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.2_Ensure_permissions_on_SSH_private_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.3_Ensure_permissions_on_SSH_public_host_key_files_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.4_Ensure_SSH_access_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.5_Ensure_SSH_LogLevel_is_appropriate"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.6_Ensure_SSH_PAM_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.7_Ensure_SSH_root_login_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.8_Ensure_SSH_HostbasedAuthentication_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.9_Ensure_SSH_PermitEmptyPasswords_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.10_Ensure_SSH_PermitUserEnvironment_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.11_Ensure_SSH_IgnoreRhosts_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.12_Ensure_SSH_X11_forwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.13_Ensure_only_strong_Ciphers_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.14_Ensure_only_strong_MAC_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.15_Ensure_only_strong_Key_Exchange_algorithms_are_used"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.16_Ensure_SSH_AllowTcpForwarding_is_disabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.17_Ensure_SSH_warning_banner_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.18_Ensure_SSH_MaxAuthTries_is_set_to_4_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.19_Ensure_SSH_MaxStartups_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.20_Ensure_SSH_LoginGraceTime_is_set_to_one_minute_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.21_Ensure_SSH_MaxSessions_is_set_to_10_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.2.22_Ensure_SSH_Idle_Timeout_Interval_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.1_Ensure_sudo_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.2_Ensure_sudo_commands_use_pty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.3_Ensure_sudo_log_file_exists"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.4_Ensure_users_must_provide_password_for_privilege_escalation"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.5_Ensure_re-authentication_for_privilege_escalation_is_not_disabled_globally"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.6_Ensure_sudo_authentication_timeout_is_configured_correctly"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.3.7_Ensure_access_to_the_su_command_is_restricted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.1_Ensure_password_creation_requirements_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.2_Ensure_lockout_for_failed_password_attempts_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.3_Ensure_password_reuse_is_limited"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.4_Ensure_strong_password_hashing_algorithm_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.4.5_Ensure_all_current_passwords_uses_the_configured_hashing_algorithm"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.1_Ensure_minimum_days_between_password_changes_is__configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.2_Ensure_password_expiration_is_365_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.3_Ensure_password_expiration_warning_days_is_7_or_more"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.4_Ensure_inactive_password_lock_is_30_days_or_less"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.5_Ensure_all_users_last_password_change_date_is_in_the_past"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.6_Ensure_the_number_of_changed_characters_in_a_new_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.1.7_Ensure_preventing_the_use_of_dictionary_words_for_passwords_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.2_Ensure_system_accounts_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.3_Ensure_default_group_for_the_root_account_is_GID_0"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.4_Ensure_default_user_umask_is_027_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.5_Ensure_default_user_shell_timeout_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.6_Ensure_nologin_is_not_listed_in_etcshells"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_4.5.7_Ensure_maximum_number_of_same_consecutive_characters_in_a_password_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.1_Ensure_systemd-journal-remote_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.2_Ensure_systemd-journal-remote_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.3_Ensure_systemd-journal-remote_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.1.4_Ensure_journald_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.2_Ensure_journald_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.3_Ensure_journald_is_configured_to_compress_large_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.4_Ensure_journald_is_configured_to_write_logfiles_to_persistent_disk"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.5_Ensure_journald_is_not_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.6_Ensure_journald_log_rotation_is_configured_per_site_policy"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.1.7_Ensure_journald_default_file_permissions_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.1_Ensure_rsyslog_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.2_Ensure_rsyslog_service_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.3_Ensure_journald_is_configured_to_send_logs_to_rsyslog"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.4_Ensure_rsyslog_default_file_permissions_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.5_Ensure_logging_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.6_Ensure_rsyslog_is_configured_to_send_logs_to_a_remote_log_host"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.2.7_Ensure_rsyslog_is_not_configured_to_receive_logs_from_a_remote_client"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.1.3_Ensure_all_logfiles_have_appropriate_access_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.1_Ensure_auditd_is_installed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.2_Ensure_auditd_service_is_enabled_and_active"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.3_Ensure_auditing_for_processes_that_start_prior_to_auditd_is_enabled"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.1.4_Ensure_audit_backlog_limit_is_sufficient"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.1_Ensure_audit_log_storage_size_is_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.2_Ensure_audit_logs_are_not_automatically_deleted"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.2.3_Ensure_system_is_disabled_when_audit_logs_are_full"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.1_Ensure_changes_to_system_administration_scope_sudoers_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.2_Ensure_actions_as_another_user_are_always_logged"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.3_Ensure_events_that_modify_the_sudo_log_file_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.4_Ensure_events_that_modify_date_and_time_information_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.5_Ensure_events_that_modify_the_systems_network_environment_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.6_Ensure_use_of_privileged_commands_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.7_Ensure_unsuccessful_file_access_attempts_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.8_Ensure_events_that_modify_usergroup_information_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.9_Ensure_discretionary_access_control_permission_modification_events_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.10_Ensure_successful_file_system_mounts_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.11_Ensure_session_initiation_information_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.12_Ensure_login_and_logout_events_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.13_Ensure_file_deletion_events_by_users_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.14_Ensure_events_that_modify_the_systems_Mandatory_Access_Controls_are_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.15_Ensure_successful_and_unsuccessful_attempts_to_use_the_chcon_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.16_Ensure_successful_and_unsuccessful_attempts_to_use_the_setfacl_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.17_Ensure_successful_and_unsuccessful_attempts_to_use_the_chacl_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.18_Ensure_successful_and_unsuccessful_attempts_to_use_the_usermod_command_are_recorded"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.19_Ensure_kernel_module_loading_unloading_and_modification_is_collected"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.20_Ensure_the_audit_configuration_is_immutable"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.3.21_Ensure_the_running_and_on_disk_configuration_is_the_same"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.1_Ensure_audit_log_files_are_mode_0640_or_less_permissive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.2_Ensure_only_authorized_users_own_audit_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.3_Ensure_only_authorized_groups_are_assigned_ownership_of_audit_log_files"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.4_Ensure_the_audit_log_directory_is_0750_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.5_Ensure_audit_configuration_files_are_640_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.6_Ensure_audit_configuration_files_are_owned_by_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.7_Ensure_audit_configuration_files_belong_to_group_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.8_Ensure_audit_tools_are_755_or_more_restrictive"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.9_Ensure_audit_tools_are_owned_by_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.10_Ensure_audit_tools_belong_to_group_root"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_5.2.4.11_Ensure_cryptographic_mechanisms_are_used_to_protect_the_integrity_of_audit_tools"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.1_Ensure_permissions_on_etcpasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.2_Ensure_permissions_on_etcpasswd-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.3_Ensure_permissions_on_etcgroup_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.4_Ensure_permissions_on_etcgroup-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.5_Ensure_permissions_on_etcshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.6_Ensure_permissions_on_etcshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.7_Ensure_permissions_on_etcgshadow_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.8_Ensure_permissions_on_etcgshadow-_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.9_Ensure_permissions_on_etcshells_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.10_Ensure_permissions_on_etcopasswd_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.11_Ensure_world_writable_files_and_directories_are_secured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.12_Ensure_no_unowned_or_ungrouped_files_or_directories_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.1.13_Ensure_SUID_and_SGID_files_are_reviewed"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.1_Ensure_accounts_in_etcpasswd_use_shadowed_passwords"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.2_Ensure_etcshadow_password_fields_are_not_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.3_Ensure_all_groups_in_etcpasswd_exist_in_etcgroup"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.4_Ensure_shadow_group_is_empty"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.5_Ensure_no_duplicate_UIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.6_Ensure_no_duplicate_GIDs_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.7_Ensure_no_duplicate_user_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.8_Ensure_no_duplicate_group_names_exist"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.9_Ensure_root_PATH_Integrity"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.10_Ensure_root_is_the_only_UID_0_account"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.11_Ensure_local_interactive_user_home_directories_are_configured"
                 selected="true"/>
   <xccdf:select idref="xccdf_org.cisecurity.benchmarks_rule_6.2.12_Ensure_local_interactive_user_dot_files_access_is_configured"
                 selected="true"/>
</xccdf:Profile>

Assessment Results

Display Only Essential Hygiene (CIS Critical Security Controls V8- IG-1)
Display Only Failures
More
w Benchmark Item Result
1 Initial Setup
1.1 Filesystem Configuration
1.1.1 Disable unused filesystems
1.1.2 Configure /tmp
1.1.3 Configure /var
1.1.4 Configure /var/tmp
1.1.5 Configure /var/log
1.1.6 Configure /var/log/audit
1.1.7 Configure /home
1.1.8 Configure /dev/shm
1.2 Filesystem Integrity Checking
1.3 Configure Software and Patch Management
1.4 Secure Boot Settings
1.5 Additional Process Hardening
1.6 Mandatory Access Control
1.6.1 Configure AppArmor
1.7 Command Line Warning Banners
1.8 GNOME Display Manager
2 Services
2.1 Configure Time Synchronization
2.1.1 Ensure time synchronization is in use
2.1.2 Configure chrony
2.1.3 Configure systemd-timesyncd
2.1.4 Configure ntp
2.2 Special Purpose Services
2.3 Service Clients
3 Network Configuration
3.1 Disable unused network protocols and devices
3.2 Network Parameters (Host Only)
3.3 Network Parameters (Host and Router)
3.4 Firewall Configuration
3.4.1 Configure UncomplicatedFirewall
3.4.2 Configure nftables
3.4.3 Configure iptables
3.4.3.1 Configure iptables software
3.4.3.2 Configure IPv4 iptables
3.4.3.3 Configure IPv6 ip6tables
4 Access, Authentication and Authorization
4.1 Configure time-based job schedulers
4.2 Configure SSH Server
4.3 Configure privilege escalation
4.4 Configure PAM
4.5 User Accounts and Environment
4.5.1 Set Shadow Password Suite Parameters
5 Logging and Auditing
5.1 Configure Logging
5.1.1 Configure journald
5.1.1.1 Ensure journald is configured to send logs to a remote log host
5.1.2 Configure rsyslog
5.2 Configure System Accounting (auditd)
5.2.1 Ensure auditing is enabled
5.2.2 Configure Data Retention
5.2.3 Configure auditd rules
5.2.4 Configure auditd file access
6 System Maintenance
6.1 System File Permissions
6.2 Local User and Group Settings

Assessment Details

1 Initial Setup

Items in this section are advised for all systems, but may be difficult or require extensive preparation after the initial setup of the system.

1.1 Filesystem Configuration

Directories that are used for system-wide functions can be further protected by placing them on separate partitions. This provides protection for resource exhaustion and enables the use of mounting options that are applicable to the directory's intended use. Users' data can be stored on separate partitions and have stricter mount options. A user partition is a filesystem that has been established for use by the users and does not contain software for system operations.

The recommendations in this section are easier to perform during initial system installation. If the system is already installed, it is recommended that a full backup be performed before repartitioning the system.

Note: If you are repartitioning a system that has already been installed (This may require the system to be in single-user mode):

  • Mount the new partition to a temporary mountpoint e.g. mount /dev/sda2 /mnt
  • Copy data from the original partition to the new partition. e.g. cp /var/tmp/* /mnt
  • Verify that all data is present on the new partition. e.g. ls -la /mnt
  • Unmount the new partition. e.g. umount /mnt
  • Remove the data from the original directory that was in the old partition. e.g. rm -Rf /var/tmp/* Otherwise it will still consume space in the old partition that will be masked when the new filesystem is mounted.
  • Mount the new partition to the desired mountpoint. e.g. mount /dev/sda2 /var/tmp
  • Update /etc/fstab with the new mountpoint. e.g. /dev/sda2 /var/tmp xfs defaults,rw,nosuid,nodev,noexec,relatime 0 0

1.1.1 Disable unused filesystems

A number of uncommon filesystem types are supported under Linux. Removing support for unneeded filesystem types reduces the local attack surface of the system. If a filesystem type is not needed it should be disabled. Native Linux file systems are designed to ensure that built-in security controls function as expected. Non-native filesystems can lead to unexpected consequences to both the security and functionality of the system and should be used with caution. Many filesystems are created for niche use cases and are not maintained and supported as the operating systems are updated and patched. Users of non-native filesystems should ensure that there is attention and ongoing support for them, especially in light of frequent operating system changes.

Standard network connectivity and Internet access to cloud storage may make the use of non-standard filesystem formats to directly attach heterogeneous devices much less attractive.

Note : This should not be considered a comprehensive list of filesystems. You may wish to consider additions to those listed here for your environment. For the current available file system modules on the system see /usr/lib/modules/$(uname -r)/kernel/fs

Start up scripts

Kernel modules loaded directly via insmod will ignore what is configured in the relevant /etc/modprobe.d/*.conf files. If modules are still being loaded after a reboot whilst having the correctly configured blacklist and install command, check for insmod entries in start up scripts such as .bashrc .

You may also want to check /lib/modprobe.d/ . Please note that this directory should not be used for user defined module loading. Ensure that all such entries resides in /etc/modprobe.d/*.conf files.

Return values

By using /bin/false as the command in disabling a particular module serves two purposes; to convey the meaning of the entry to the user and cause a non-zero return value. The latter can be tested for in scripts. Please note that insmod will ignore what is configured in the relevant /etc/modprobe.d/*.conf files. The preferred way to load modules is with modprobe .

1.1.2 Configure /tmp

The /tmp directory is a world-writable directory used for temporary storage by all users and some applications.

1.1.3 Configure /var

The /var directory is used by daemons and other system services to temporarily store dynamic data. Some directories created by these processes may be world-writable.

1.1.4 Configure /var/tmp

The /var/tmp directory is a world-writable directory used for temporary storage by all users and some applications. Temporary files residing in /var/tmp are to be preserved between reboots.

1.1.5 Configure /var/log

The /var/log directory is used by system services to store log data.

1.1.6 Configure /var/log/audit

The auditing daemon, auditd , stores log data in the /var/log/audit directory.

1.1.7 Configure /home

Please note that home directories could be mounted anywhere and are not necessarily restricted to /home nor restricted to a single location, nor is the name restricted in any way.

Checks can be made by looking in /etc/passwd , looking over the mounted file systems with mount or querying the relevant database with getent .

1.1.8 Configure /dev/shm

1.2 Filesystem Integrity Checking

AIDE is a file integrity checking tool, similar in nature to Tripwire. While it cannot prevent intrusions, it can detect unauthorized changes to configuration files by alerting when the files are changed. When setting up AIDE, decide internally what the site policy will be concerning integrity checking. Review the AIDE quick start guide and AIDE documentation before proceeding.

1.3 Configure Software and Patch Management

Outdated software is vulnerable to cyber criminals and hackers. Software updates help reduce the risk to your organization. The release of software update notes often reveal the patched exploitable entry points to the public. Public knowledge of these exploits cans your organization more vulnerable to malicious actors attempting to gain entry to your system's data.

Software updates often offer new and improved features and speed enhancements

1.4 Secure Boot Settings

The recommendations in this section focus on securing the bootloader and settings involved in the boot process directly.

1.5 Additional Process Hardening

1.6 Mandatory Access Control

Mandatory Access Control (MAC) provides an additional layer of access restrictions to processes on top of the base Discretionary Access Controls. By restricting how processes can access files and resources on a system the potential impact from vulnerabilities in the processes can be reduced.

Impact: Mandatory Access Control limits the capabilities of applications and daemons on a system, while this can prevent unauthorized access the configuration of MAC can be complex and difficult to implement correctly preventing legitimate access from occurring.

Note:

  • Apparmor is the default MAC provided with Debian-based systems.
  • Additional Mandatory Access Control systems to include SELinux exist. If a different Mandatory Access Control systems is used, please follow it's vendors guidance for proper implementation in place of the guidance provided in this section

1.6.1 Configure AppArmor

AppArmor provides a Mandatory Access Control (MAC) system that greatly augments the default Discretionary Access Control (DAC) model. Under AppArmor MAC rules are applied by file paths instead of by security contexts as in other MAC systems. As such it does not require support in the filesystem and can be applied to network mounted filesystems for example. AppArmor security policies define what system resources applications can access and what privileges they can do so with. This automatically limits the damage that the software can do to files accessible by the calling user. The user does not need to take any action to gain this benefit. For an action to occur, both the traditional DAC permissions must be satisfied as well as the AppArmor MAC rules. The action will not be allowed if either one of these models does not permit the action. In this way, AppArmor rules can only make a system's permissions more restrictive and secure.

References:

  1. AppArmor Documentation: http://wiki.apparmor.net/index.php/Documentation
  2. Ubuntu AppArmor Documentation: https://help.ubuntu.com/community/AppArmor
  3. SUSE AppArmor Documentation: https://www.suse.com/documentation/apparmor/

1.7 Command Line Warning Banners

Presenting a warning message prior to the normal user login may assist in the prosecution of trespassers on the computer system. Changing some of these login banners also has the side effect of hiding OS version information and other detailed system information from attackers attempting to target specific exploits at a system. The /etc/motd , /etc/issue , and /etc/issue.net files govern warning banners for standard command line logins for both local and remote users.

Guidelines published by the US Department of Defense require that warning messages include at least the name of the organization that owns the system, the fact that the system is subject to monitoring and that such monitoring is in compliance with local statutes, and that use of the system implies consent to such monitoring. It is important that the organization's legal counsel review the content of all messages before any system modifications are made, as these warning messages are inherently site-specific. More information (including citations of relevant case law) can be found at http://www.justice.gov/criminal/cybercrime/

Note: The text provided in the remediation actions for these items is intended as an example only. Please edit to include the specific text for your organization as approved by your legal department

1.8 GNOME Display Manager

The GNOME Display Manager (GDM) is a program that manages graphical display servers and handles graphical user logins.

Note: If GDM is not installed on the system, this section can be skipped

2 Services

While applying system updates and patches helps correct known vulnerabilities, one of the best ways to protect the system against as yet unreported vulnerabilities is to disable all services that are not required for normal system operation. This prevents the exploitation of vulnerabilities discovered at a later date. If a service is not enabled, it cannot be exploited. The actions in this section of the document provide guidance on some services which can be safely disabled and under which circumstances, greatly reducing the number of possible threats to the resulting system. Additionally some services which should remain enabled but with secure configuration are covered as well as insecure service clients.

Note: This should not be considered a comprehensive list of insecure services. You may wish to consider additions to those listed here for your environment.

2.1 Configure Time Synchronization

It is recommended that physical systems and virtual guests lacking direct access to the physical host's clock be configured to synchronize their time using a service such as systemd-timesyncd, chrony, or ntp.

Note:

  • If access to a physical host's clock is available and configured according to site policy, this section can be skipped
  • Only one time synchronization method should be in use on the system
  • Only the section related to the time synchronization method in use on the system should be followed, all other time synchronization recommendations should be skipped
  • If access to a physical host's clock is available and configured according to site policy:
    • systemd-timesyncd should be stopped and masked
    • chrony should be removed from the system
    • ntp should be removed from the system

2.1.1 Ensure time synchronization is in use

It is recommended that physical systems and virtual guests lacking direct access to the physical host's clock be configured to synchronize their time using a service such as systemd-timesyncd, chrony, or ntp.

2.1.2 Configure chrony

chrony is a daemon which implements the Network Time Protocol (NTP) and is designed to synchronize system clocks across a variety of systems and use a source that is highly accurate.

chrony can be configured to be a client and/or a server.

More information on chrony can be found at: http://chrony.tuxfamily.org/ .

Note:

  • If ntp or systemd-timesyncd are used, chrony should be removed and this section skipped
  • Only one time synchronization method should be in use on the system

2.1.3 Configure systemd-timesyncd

systemd-timesyncd is a daemon that has been added for synchronizing the system clock across the network. It implements an SNTP client. In contrast to NTP implementations such as chrony or the NTP reference server this only implements a client side, and does not bother with the full NTP complexity, focusing only on querying time from one remote server and synchronizing the local clock to it. The daemon runs with minimal privileges, and has been hooked up with networkd to only operate when network connectivity is available. The daemon saves the current clock to disk every time a new NTP sync has been acquired, and uses this to possibly correct the system clock early at bootup, in order to accommodate for systems that lack an RTC such as the Raspberry Pi and embedded devices, and make sure that time monotonically progresses on these systems, even if it is not always correct. To make use of this daemon a new system user and group "systemd-timesync" needs to be created on installation of systemd.

The default configuration is set during compilation, so configuration is only needed when it is necessary to deviate from those defaults. Initially, the main configuration file in /etc/systemd/ contains commented out entries showing the defaults as a guide to the administrator. Local overrides can be created by editing this file or by creating drop-ins, as described below. Using drop-ins for local configuration is recommended over modifications to the main configuration file.

In addition to the "main" configuration file, drop-in configuration snippets are read from /usr/lib/systemd/*.conf.d/ , /usr/local/lib/systemd/*.conf.d/ , and /etc/systemd/*.conf.d/ . Those drop-ins have higher precedence and override the main configuration file. Files in the *.conf.d/ configuration subdirectories are sorted by their filename in lexicographic order, regardless of in which of the subdirectories they reside. When multiple files specify the same option, for options which accept just a single value, the entry in the file sorted last takes precedence, and for options which accept a list of values, entries are collected as they occur in the sorted files.

When packages need to customize the configuration, they can install drop-ins under /usr/. Files in /etc/ are reserved for the local administrator, who may use this logic to override the configuration files installed by vendor packages. Drop-ins have to be used to override package drop-ins, since the main configuration file has lower precedence. It is recommended to prefix all filenames in those subdirectories with a two-digit number and a dash, to simplify the ordering of the files.

To disable a configuration file supplied by the vendor, the recommended way is to place a symlink to /dev/null in the configuration directory in /etc/, with the same filename as the vendor configuration file.

Note:

  • The recommendations in this section only apply if timesyncd is in use on the system
  • The systemd-timesyncd service specifically implements only SNTP.
    • This minimalistic service will set the system clock for large offsets or slowly adjust it for smaller deltas
    • More complex use cases are not covered by systemd-timesyncd
  • If chrony or ntp are used, systemd-timesyncd should be stopped and masked, and this section skipped
  • One, and only one, time synchronization method should be in use on the system

2.1.4 Configure ntp

ntp is a daemon which implements the Network Time Protocol (NTP). It is designed to synchronize system clocks across a variety of systems and use a source that is highly accurate. More information on NTP can be found at http://www.ntp.org . ntp can be configured to be a client and/or a server.

Note:

  • If chrony or systemd-timesyncd are used, ntp should be removed and this section skipped
  • This recommendation only applies if ntp is in use on the system
  • Only one time synchronization method should be in use on the system

2.2 Special Purpose Services

This section describes services that are installed on systems that specifically need to run these services. If any of these services are not required, it is recommended that they be deleted from the system to reduce the potential attack surface. If a package is required as a dependency, and the service is not required, the service should be stopped and masked.

The following command can be used to stop and mask the service:

# systemctl --now mask <service_name>

2.3 Service Clients

A number of insecure services exist. While disabling the servers prevents a local attack against these services, it is advised to remove their clients unless they are required.

Note: This should not be considered a comprehensive list of insecure service clients. You may wish to consider additions to those listed here for your environment.

3 Network Configuration

This section provides guidance on for securing the network configuration of the system through kernel parameters, access list control, and firewall settings.

Note:

  • sysctl settings are defined through files in /usr/lib/sysctl.d/ , /run/sysctl.d/ , and /etc/sysctl.d/ .
  • Files must have the " .conf " extension.
  • Vendors settings live in /usr/lib/sysctl.d/
  • To override a whole file, create a new file with the same name in /etc/sysctl.d/ and put new settings there.
  • To override only specific settings, add a file with a lexically later name in /etc/sysctl.d/ and put new settings there.
  • The paths where sysctl preload files usually exist
    • /run/sysctl.d/*.conf
    • /etc/sysctl.d/*.conf
    • /usr/local/lib/sysctl.d/*.conf
    • /usr/lib/sysctl.d/*.conf
    • /lib/sysctl.d/*.conf
    • /etc/sysctl.conf
  • On systems with Uncomplicated Firewall, additional settings may be configured in /etc/ufw/sysctl.conf
    • The settings in /etc/ufw/sysctl.conf will override settings in /etc/sysctl.conf
    • This behavior can be changed by updating the IPT_SYSCTL parameter in /etc/default/ufw

3.1 Disable unused network protocols and devices

To reduce the attack surface of a system, unused network protocols and devices should be disabled.

The Linux kernel modules support several network protocols that are not commonly used. If these protocols are not needed, it is recommended that they be disabled in the kernel.

Note: This should not be considered a comprehensive list of uncommon network protocols, you may wish to consider additions to those listed here for your environment.

3.2 Network Parameters (Host Only)

The following network parameters are intended for use if the system is to act as a host only. A system is considered host only if the system has a single interface, or has multiple interfaces but will not be configured as a router.

Note:

Configuration files are read from directories in /etc/ , /run/ , /usr/local/lib/ , and /lib/ , in order of precedence. Files must have the the ".conf" extension. extension. Files in /etc/ override files with the same name in /run/ , /usr/local/lib/ , and /lib/ . Files in /run/ override files with the same name under /usr/ .

All configuration files are sorted by their filename in lexicographic order, regardless of which of the directories they reside in. If multiple files specify the same option, the entry in the file with the lexicographically latest name will take precedence. Thus, the configuration in a certain file may either be replaced completely (by placing a file with the same name in a directory with higher priority), or individual settings might be changed (by specifying additional settings in a file with a different name that is ordered later).

Packages should install their configuration files in /usr/lib/ (distribution packages) or /usr/local/lib/ (local installs). Files in /etc/ are reserved for the local administrator, who may use this logic to override the configuration files installed by vendor packages. It is recommended to prefix all filenames with a two-digit number and a dash, to simplify the ordering of the files.

If the administrator wants to disable a configuration file supplied by the vendor, the recommended way is to place a symlink to /dev/null in the configuration directory in /etc/ , with the same filename as the vendor configuration file. If the vendor configuration file is included in the initrd image, the image has to be regenerated.

3.3 Network Parameters (Host and Router)

The following network parameters are intended for use on both host only and router systems. A system acts as a router if it has at least two interfaces and is configured to perform routing functions.

Note:

Configuration files are read from directories in /etc/ , /run/ , /usr/local/lib/ , and /lib/ , in order of precedence. Files must have the the ".conf" extension. extension. Files in /etc/ override files with the same name in /run/ , /usr/local/lib/ , and /lib/ . Files in /run/ override files with the same name under /usr/ .

All configuration files are sorted by their filename in lexicographic order, regardless of which of the directories they reside in. If multiple files specify the same option, the entry in the file with the lexicographically latest name will take precedence. Thus, the configuration in a certain file may either be replaced completely (by placing a file with the same name in a directory with higher priority), or individual settings might be changed (by specifying additional settings in a file with a different name that is ordered later).

Packages should install their configuration files in /usr/lib/ (distribution packages) or /usr/local/lib/ (local installs). Files in /etc/ are reserved for the local administrator, who may use this logic to override the configuration files installed by vendor packages. It is recommended to prefix all filenames with a two-digit number and a dash, to simplify the ordering of the files.

If the administrator wants to disable a configuration file supplied by the vendor, the recommended way is to place a symlink to /dev/null in the configuration directory in /etc/ , with the same filename as the vendor configuration file. If the vendor configuration file is included in the initrd image, the image has to be regenerated.

3.4 Firewall Configuration

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through

To provide a Host Based Firewall, the Linux kernel includes support for:

  • Netfilter - A set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack. Includes the ip_tables, ip6_tables, arp_tables, and ebtables kernel modules. These modules are some of the significant parts of the Netfilter hook system.
  • nftables - A subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames. nftables is supposed to replace certain parts of Netfilter, while keeping and reusing most of it. nftables utilizes the building blocks of the Netfilter infrastructure, such as the existing hooks into the networking stack, connection tracking system, userspace queueing component, and logging subsystem. Is available in Linux kernels 3.13 and newer .

In order to configure firewall rules for Netfilter or nftables, a firewall utility needs to be installed. Guidance has been included for the following firewall utilities:

  • UncomplicatedFirewall (ufw) - Provides firewall features by acting as a front-end for the Linux kernel's netfilter framework via the iptables backend. ufw supports both IPv4 and IPv6 networks
  • nftables - Includes the nft utility for configuration of the nftables subsystem of the Linux kernel
  • iptables - Includes the iptables, ip6tables, arptables and ebtables utilities for configuration Netfilter and the ip_tables, ip6_tables, arp_tables, and ebtables kernel modules.

Note:

  • Only one method should be used to configure a firewall on the system. Use of more than one method could produce unexpected results
  • This section is intended only to ensure the resulting firewall rules are in place, not how they are configured

3.4.1 Configure UncomplicatedFirewall

If nftables or iptables are being used in your environment, please follow the guidance in their respective section and pass-over the guidance in this section.

Uncomplicated Firewall (UFW) is a program for managing a netfilter firewall designed to be easy to use.

  • Uses a command-line interface consisting of a small number of simple commands
  • Uses iptables for configuration
  • Rules are processed until first matching rule. The first matching rule will be applied.

Note:

  • Configuration of a live system's firewall directly over a remote connection will often result in being locked out
  • Rules should be ordered so that ALLOW rules come before DENY rules.

3.4.2 Configure nftables

If Uncomplicated Firewall (UFW) or iptables are being used in your environment, please follow the guidance in their respective section and pass-over the guidance in this section.

nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames and is the successor to iptables. The biggest change with the successor nftables is its simplicity. With iptables, we have to configure every single rule and use the syntax which can be compared with normal commands. With nftables, the simpler syntax, much like BPF (Berkely Packet Filter) means shorter lines and less repetition. Support for nftables should also be compiled into the kernel, together with the related nftables modules. Please ensure that your kernel supports nf_tables before choosing this option.

Note:

  • This section broadly assumes starting with an empty nftables firewall ruleset (established by flushing the rules with nft flush ruleset).
  • Remediation steps included only affect the live system, you will also need to configure your default firewall configuration to apply on boot.
  • Configuration of a live systems firewall directly over a remote connection will often result in being locked out. It is advised to have a known good firewall configuration set to run on boot and to configure an entire firewall structure in a script that is then run and tested before saving to boot.

The following will implement the firewall rules of this section and open ICMP, IGMP, and port 22(ssh) from anywhere. Opening the ports for ICMP, IGMP, and port 22(ssh) needs to be updated in accordance with local site policy. Allow port 22(ssh) needs to be updated to only allow systems requiring ssh connectivity to connect, as per site policy .

Save the script bellow as /etc/nftables.rules

#!/sbin/nft -f



# This nftables.rules config should be saved as /etc/nftables.rules

# flush nftables rulesset

flush ruleset

# Load nftables ruleset

# nftables config with inet table named filter

table inet filter {

# Base chain for input hook named input (Filters inbound network packets)

chain input {

type filter hook input priority 0; policy drop;



# Ensure loopback traffic is configured

iif "lo" accept

ip saddr 127.0.0.0/8 counter packets 0 bytes 0 drop

ip6 saddr ::1 counter packets 0 bytes 0 drop



# Ensure established connections are configured

ip protocol tcp ct state established accept

ip protocol udp ct state established accept

ip protocol icmp ct state established accept



# Accept port 22(SSH) traffic from anywhere

tcp dport ssh accept



# Accept ICMP and IGMP from anywhere

icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, mld-listener-query, mld-listener-report, mld-listener-done, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, ind-neighbor-solicit, ind-neighbor-advert, mld2-listener-report } accept

icmp type { destination-unreachable, router-advertisement, router-solicitation, time-exceeded, parameter-problem } accept

ip protocol igmp accept

}



# Base chain for hook forward named forward (Filters forwarded network packets)

chain forward {

type filter hook forward priority 0; policy drop;

}



# Base chain for hook output named output (Filters outbount network packets)

chain output {

type filter hook output priority 0; policy drop;

# Ensure outbound and established connections are configured

ip protocol tcp ct state established,related,new accept

ip protocol udp ct state established,related,new accept

ip protocol icmp ct state established,related,new accept

}

}

Run the following command to load the file into nftables

# nft -f /etc/nftables.rules

All changes in the nftables subsections are temporary.

To make these changes permanent:

Run the following command to create the nftables.rules file

nft list ruleset > /etc/nftables.rules

Add the following line to /etc/nftables.conf

include "/etc/nftables.rules"

3.4.3 Configure iptables

If Uncomplicated Firewall (UFW) or nftables are being used in your environment, please follow the guidance in their respective section and pass-over the guidance in this section.

IPtables is an application that allows a system administrator to configure the IPv4 and IPv6 tables, chains and rules provided by the Linux kernel firewall. While several methods of configuration exist this section is intended only to ensure the resulting IPtables rules are in place, not how they are configured. If IPv6 is in use in your environment, similar settings should be applied to the IP6tables as well.

Note: Configuration of a live system's firewall directly over a remote connection will often result in being locked out

3.4.3.1 Configure iptables software

This section provides guidance for installing, enabling, removing, and disabling software packages necessary for using IPTables as the method for configuring and maintaining a Host Based Firewall on the system.

Note: Using more than one method to configure and maintain a Host Based Firewall can cause unexpected results. If FirewallD or NFTables are being used for configuration and maintenance, this section should be skipped and the guidance in their respective section followed.

3.4.3.2 Configure IPv4 iptables

Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains.

Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the same table.

Note: This section broadly assumes starting with an empty IPtables firewall ruleset (established by flushing the rules with iptables -F). Remediation steps included only affect the live system, you will also need to configure your default firewall configuration to apply on boot. Configuration of a live systems firewall directly over a remote connection will often result in being locked out. It is advised to have a known good firewall configuration set to run on boot and to configure an entire firewall structure in a script that is then run and tested before saving to boot. The following script will implement the firewall rules of this section and open port 22(ssh) from anywhere:

#!/bin/bash



# Flush IPtables rules

iptables -F



# Ensure default deny firewall policy

iptables -P INPUT DROP

iptables -P OUTPUT DROP

iptables -P FORWARD DROP



# Ensure loopback traffic is configured

iptables -A INPUT -i lo -j ACCEPT

iptables -A OUTPUT -o lo -j ACCEPT

iptables -A INPUT -s 127.0.0.0/8 -j DROP



# Ensure outbound and established connections are configured

iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -j ACCEPT

iptables -A OUTPUT -p udp -m state --state NEW,ESTABLISHED -j ACCEPT

iptables -A OUTPUT -p icmp -m state --state NEW,ESTABLISHED -j ACCEPT

iptables -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT

iptables -A INPUT -p udp -m state --state ESTABLISHED -j ACCEPT

iptables -A INPUT -p icmp -m state --state ESTABLISHED -j ACCEPT



# Open inbound ssh(tcp port 22) connections

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j ACCEPT

3.4.3.3 Configure IPv6 ip6tables

Ip6tables is used to set up, maintain, and inspect the tables of IPv6 packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains. Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a `target', which may be a jump to a user-defined chain in the same table.

If IPv6 in enabled on the system, the ip6tables should be configured.

Note: This section broadly assumes starting with an empty ip6tables firewall ruleset (established by flushing the rules with ip6tables -F). Remediation steps included only affect the live system, you will also need to configure your default firewall configuration to apply on boot. Configuration of a live systems firewall directly over a remote connection will often result in being locked out. It is advised to have a known good firewall configuration set to run on boot and to configure an entire firewall structure in a script that is then run and tested before saving to boot.

The following script will implement the firewall rules of this section and open port 22(ssh) from anywhere:

#!/bin/bash



# Flush ip6tables rules

ip6tables -F



# Ensure default deny firewall policy

ip6tables -P INPUT DROP

ip6tables -P OUTPUT DROP

ip6tables -P FORWARD DROP



# Ensure loopback traffic is configured

ip6tables -A INPUT -i lo -j ACCEPT

ip6tables -A OUTPUT -o lo -j ACCEPT

ip6tables -A INPUT -s ::1 -j DROP



# Ensure outbound and established connections are configured

ip6tables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -j ACCEPT

ip6tables -A OUTPUT -p udp -m state --state NEW,ESTABLISHED -j ACCEPT

ip6tables -A OUTPUT -p icmp -m state --state NEW,ESTABLISHED -j ACCEPT

ip6tables -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT

ip6tables -A INPUT -p udp -m state --state ESTABLISHED -j ACCEPT

ip6tables -A INPUT -p icmp -m state --state ESTABLISHED -j ACCEPT



# Open inbound ssh(tcp port 22) connections

ip6tables -A INPUT -p tcp --dport 22 -m state --state NEW -j ACCEPT

4 Access, Authentication and Authorization

4.1 Configure time-based job schedulers

cron is a time-based job scheduler used to schedule jobs, commands or shell scripts, to run periodically at fixed times, dates, or intervals.

at provides the ability to execute a command or shell script at a specified date and hour, or after a given interval of time.

Notes:

  • Other methods exist for scheduling jobs, such as systemd timers . If another method is used, it should be secured in accordance with local site policy
  • systemd timers are systemd unit files whose name ends in .timer that control .service files or events
    • Timers can be used as an alternative to cron and at
    • Timers have built-in support for calendar time events, monotonic time events, and can be run asynchronously
  • If cron and at are not installed, this section can be skipped

4.2 Configure SSH Server

SSH is a secure, encrypted replacement for common login services such as telnet , ftp , rlogin , rsh , and rcp . It is strongly recommended that sites abandon older clear-text login protocols and use SSH to prevent session hijacking and sniffing of sensitive data off the network.

Note:

  • The recommendations in this section only apply if the SSH daemon is installed on the system, if remote access is not required the SSH daemon can be removed and this section skipped.
  • The following openSSH daemon configuration options, Include and Match , may cause the audits in this section's recommendations to report incorrectly. It is recommended that these options only be used if they're needed and fully understood. If these options are configured in accordance with local site policy, they should be accounted for when following the recommendations in this section.
  • The default Include location is the /etc/ssh/sshd_config.d directory. This default has been accounted for in this section. If a file has an additional Include that isn't this default location, the files should be reviewed to verify that the recommended setting is not being over-ridden.
  • The audits of the running configuration in this section are run in the context of the root user, the local host name, and the local host's IP address. If a Match block exists that matches one of these criteria, the output of the audit will be from the match block. The respective matched criteria should be replaced with a non-matching substitution.
  • Once all configuration changes have been made to /etc/ssh/sshd_config or any included configuration files, the sshd configuration must be reloaded
  • Include :
    • Include the specified configuration file(s).
    • Multiple pathnames may be specified and each pathname may contain glob(7) wildcards.
    • Files without absolute paths are assumed to be in /etc/ssh.
    • An Include directive may appear inside a Match block to perform conditional inclusion.
  • Match :
    • Introduces a conditional block.
    • If all of the criteria on the Match line are satisfied, the keywords on the following lines override those set in the global section of the config file, until either another Match line or the end of the file.
    • If a keyword appears in multiple Match blocks that are satisfied, only the first instance of the keyword is applied.
    • The arguments to Match are one or more criteria-pattern pairs or the single token All which matches all criteria. The available criteria are User, Group, Host, LocalAddress, LocalPort, RDomain, and Address (with RDomain representing the rdomain(4) on which the connection was received).
    • The match patterns may consist of single entries or comma-separated lists and may use the wildcard and negation operators described in the PATTERNS section of ssh_config(5).
    • The patterns in an Address criteria may additionally contain addresses to match in CIDR address/masklen format, such as 192.0.2.0/24 or 2001:db8::/32. Note that the mask length provided must be consistent with the address - it is an error to specify a mask length that is too long for the address or one with bits set in this host portion of the address. For example, 192.0.2.0/33 and 192.0.2.0/8, respectively.
    • Only a subset of keywords may be used on the lines following a Match keyword.
    • Available keywords are: AcceptEnv , AllowAgentForwarding , AllowGroups , AllowStreamLocalForwarding , AllowTcpForwarding , AllowUsers , AuthenticationMethods , AuthorizedKeysCommand , AuthorizedKeysCommandUser , AuthorizedKeysFile , AuthorizedPrincipalsCommand , AuthorizedPrincipalsCommandUser , AuthorizedPrincipalsFile , Banner , ChrootDirectory , ClientAliveCountMax , ClientAliveInterval , DenyGroups , DenyUsers , ForceCommand , GatewayPorts , GSSAPIAuthentication , HostbasedAcceptedKeyTypes , HostbasedAuthentication , HostbasedUsesNameFromPacketOnly , Include , IPQoS , KbdInteractiveAuthentication , KerberosAuthentication , LogLevel , MaxAuthTries , MaxSessions , PasswordAuthentication , PermitEmptyPasswords , PermitListen , PermitOpen , PermitRootLogin , PermitTTY , PermitTunnel , PermitUserRC , PubkeyAcceptedKeyTypes , PubkeyAuthentication , RekeyLimit , RevokedKeys , RDomain , SetEnv , StreamLocalBindMask , StreamLocalBindUnlink , TrustedUserCAKeys , X11DisplayOffset , X11Forwarding and X11UseLocalhost .

Command to re-load the SSH daemon configuration:

# systemctl reload sshd

Command to remove the SSH daemon:

# apt purge openssh-server

4.3 Configure privilege escalation

There are various tools which allows a permitted user to execute a command as the superuser or another user, as specified by the security policy.

sudo

sudo documentation

The invoking user's real (not effective) user ID is used to determine the user name with which to query the security policy.

sudo supports a plug-in architecture for security policies and input/output logging. Third parties can develop and distribute their own policy and I/O logging plug-ins to work seamlessly with the sudo front end. The default security policy is sudoers , which is configured via the file /etc/sudoers and any entries in /etc/sudoers.d .

pkexec

pkexec documentation

pkexec allows an authorized user to execute PROGRAM as another user. If username is not specified, then the program will be executed as the administrative super user, root .

4.4 Configure PAM

PAM (Pluggable Authentication Modules) is a service that implements modular authentication modules on UNIX systems. PAM is implemented as a set of shared objects that are loaded and executed when a program needs to authenticate a user. Files for PAM are typically located in the /etc/pam.d directory. PAM must be carefully configured to secure system authentication. While this section covers some of PAM, please consult other PAM resources to fully understand the configuration capabilities.

Note: The usage of pam-auth-update :

  • As of this writing, the management of PAM via pam-auth-update does not offer all the required functionality implemented by the benchmark. As such, the usage of pam-auth-update is not recommended at present.

4.5 User Accounts and Environment

This section provides guidance on setting up secure defaults for system and user accounts and their environment.

4.5.1 Set Shadow Password Suite Parameters

While a majority of the password control parameters have been moved to PAM, some parameters are still available through the shadow password suite. Any changes made to /etc/login.defs will only be applied if the usermod command is used. If user IDs are added a different way, use the chage command to effect changes to individual user IDs.

5 Logging and Auditing

The items in this section describe how to configure logging, log monitoring, and auditing, using tools included in most distributions.

It is recommended that rsyslog be used for logging (with logwatch providing summarization) and auditd be used for auditing (with aureport providing summarization) to automatically monitor logs for intrusion attempts and other suspicious system behavior.

In addition to the local log files created by the steps in this section, it is also recommended that sites collect copies of their system logs on a secure, centralized log server via an encrypted connection. Not only does centralized logging help sites correlate events that may be occurring on multiple systems, but having a second copy of the system log information may be critical after a system compromise where the attacker has modified the local log files on the affected system(s). If a log correlation system is deployed, configure it to process the logs described in this section.

Because it is often necessary to correlate log information from many different systems (particularly after a security incident) it is recommended that the time be synchronized among systems and devices connected to the local network.

It is important that all logs described in this section be monitored on a regular basis and correlated to determine trends. A seemingly innocuous entry in one log could be more significant when compared to an entry in another log.

Note on log file permissions: There really isn't a "one size fits all" solution to the permissions on log files. Many sites utilize group permissions so that administrators who are in a defined security group, such as "wheel" do not have to elevate privileges to root in order to read log files. Also, if a third party log aggregation tool is used, it may need to have group permissions to read the log files, which is preferable to having it run setuid to root. Therefore, there are two remediation and audit steps for log file permissions. One is for systems that do not have a secured group method implemented that only permits root to read the log files ( root:root 600 ). The other is for sites that do have such a setup and are designated as root:securegrp 640 where securegrp is the defined security group (in some cases wheel ).

5.1 Configure Logging

Logging services should be configured to prevent information leaks and to aggregate logs on a remote server so that they can be reviewed in the event of a system compromise. A centralized log server provides a single point of entry for further analysis, monitoring and filtering.

Security principals for logging

  • Ensure transport layer security is implemented between the client and the log server.
  • Ensure that logs are rotated as per the environment requirements.
  • Ensure all locally generated logs have the appropriate permissions.
  • Ensure all security logs are sent to a remote log server.
  • Ensure the required events are logged.

What is covered

This section will cover the minimum best practices for the usage of eitherrsyslogorjournald . The recommendations are written such that each is wholly independent of each other and only one is implemented .

  • If your organization makes use of an enterprise wide logging system completely outside of rsyslog or journald , then the following recommendations does not directly apply. However, the principals of the recommendations should be followed regardless of what solution is implemented. If the enterprise solution incorporates either of these tools, careful consideration should be given to the following recommendations to determine exactly what applies.
  • Should your organization make use of both rsyslog and journald , take care how the recommendations may or may not apply to you.

What is not covered

  • Enterprise logging systems not utilizing rsyslog or journald . As logging is very situational and dependant on the local environment, not everything can be covered here.
  • Transport layer security should be applied to all remote logging functionality. Both rsyslog and journald supports secure transport and should be configured as such.
  • The log server. There are a multitude of reasons for a centralized log server (and keeping a short period logging on the local system), but the log server is out of scope for these recommendations.

5.1.1 Configure journald

Included in the systemd suite is a journaling service called systemd-journald.service for the collection and storage of logging data. It creates and maintains structured, indexed journals based on logging information that is received from a variety of sources such as:

  • Classic RFC3164 BSD syslog via the /dev/log socket
  • STDOUT/STDERR of programs via StandardOutput=journal + StandardError=journal in service files (both of which are default settings)
  • Kernel log messages via the /dev/kmsg device node
  • Audit records via the kernel’s audit subsystem
  • Structured log messages via journald’s native protocol

Any changes made to the systemd-journald configuration will require a re-start of systemd-journald

5.1.1.1 Ensure journald is configured to send logs to a remote log host

5.1.2 Configure rsyslog

The rsyslog software package may be used instead of the default journald logging mechanism.

Note: This section only applies if rsyslog is the chosen method for client side logging. Do not apply this section if journald is used.

5.2 Configure System Accounting (auditd)

The Linux Auditing System operates on a set of rules that collects certain types of system activity to facilitate incident investigation, detect unauthorized access or modification of data. By default events will be logged to /var/log/audit/audit.log , which can be configured in /etc/audit/auditd.conf .

The following types of audit rules can be specified:

  • Control rules: Configuration of the auditing system.
  • File system rules: Allow the auditing of access to a particular file or a directory. Also known as file watches.
  • System call rules: Allow logging of system calls that any specified program makes.

Audit rules can be set:

  • On the command line using the auditctl utility. These rules are not persistent across reboots.
  • In /etc/audit/audit.rules . These rules have to be merged and loaded before they are active.

Notes:

  • For 64 bit systems that have arch as a rule parameter, you will need two rules: one for 64 bit and one for 32 bit systems calls. For 32 bit systems, only one rule is needed.
  • If the auditing system is configured to be locked ( -e 2 ), a system reboot will be required in order to load any changes.
  • Key names are optional on the rules and will not be used as a compliance auditing. The usage of key names is highly recommended as it facilitates organisation and searching, as such, all remediation steps will have key names supplied.
  • It is best practice to store the rules, in number prepended files, in /etc/audit/rules.d/ . Rules must end in a .rules suffix. This then requires the use of augenrules to merge all the rules into /etc/audit/audit.rules based on their their alphabetical (lexical) sort order. All benchmark recommendations follow this best practice for remediation, specifically using the prefix of 50 which is centre weighed if all rule sets make use of the number prepending naming convention.
  • Your system may have been customized to change the default UID_MIN . All samples output uses 1000 , but this value will not be used in compliance auditing. To confirm the UID_MIN for your system, run the following command: awk '/^\s*UID_MIN/{print $2}' /etc/login.defs

Normalization

The Audit system normalizes some entries, so when you look at the sample output keep in mind that:

  • With regards to users whose login UID is not set, the values -1 / unset / 4294967295 are equivalent and normalized to -1 .
  • When comparing field types and both sides of the comparison is valid fields types, such as euid!=uid , then the auditing system may normalize such that the output is uid!=euid .
  • Some parts of the rule may be rearranged whilst others are dependant on previous syntax. For example, the following two statements are the same:
-a always,exit -F arch=b64 -S execve -C uid!=euid -F auid!=-1 -F key=user_emulation

and

-a always,exit -F arch=b64 -C euid!=uid -F auid!=unset -S execve -k user_emulation

Capacity planning

The recommendations in this section implement auditing policies that not only produces large quantities of logged data, but may also negatively impact system performance. Capacity planning is critical in order not to adversely impact production environments.

  • Disk space. If a significantly large set of events are captured, additional on system or off system storage may need to be allocated. If the logs are not sent to a remote log server, ensure that log rotation is implemented else the disk will fill up and the system will halt. Even when logs are sent to a log server, ensure sufficient disk space to allow caching of logs in the case of temporary network outages.
  • Disk IO. It is not just the amount of data collected that should be considered, but the rate at which logs are generated.
  • CPU overhead. System call rules might incur considerable CPU overhead. Test the systems open/close syscalls per second with and without the rules to gauge the impact of the rules.

5.2.1 Ensure auditing is enabled

The capturing of system events provides system administrators with information to allow them to determine if unauthorized access to their system is occurring.

5.2.2 Configure Data Retention

When auditing, it is important to carefully configure the storage requirements for audit logs. By default, auditd will max out the log files at 5MB and retain only 4 copies of them. Older versions will be deleted. It is possible on a system that the 20 MBs of audit logs may fill up the system causing loss of audit data. While the recommendations here provide guidance, check your site policy for audit storage requirements.

5.2.3 Configure auditd rules

The Audit system operates on a set of rules that define what is to be captured in the log files.

The following types of Audit rules can be specified:

  • Control rules: Allow the Audit system's behavior and some of its configuration to be modified.
  • File system rules: Allow the auditing of access to a particular file or a directory. (Also known as file watches)
  • System call rules: Allow logging of system calls that any specified program makes.

Audit rules can be set:

  • on the command line using the auditctl utility. Note that these rules are not persistent across reboots.
  • in a file ending in .rules in the /etc/audit/audit.d/ directory.

5.2.4 Configure auditd file access

Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events.

6 System Maintenance

Recommendations in this section are intended as maintenance and are intended to be checked on a frequent basis to ensure system stability. Many recommendations do not have quick remediations and require investigation into the cause and best fix available and may indicate an attempted breach of system security.

6.1 System File Permissions

This section provides guidance on securing aspects of system files and directories.

6.2 Local User and Group Settings

This section provides guidance on securing aspects of the local users and groups.

Note: The recommendations in this section check local users and groups. Any users or groups from other sources such as LDAP will not be audited. In a domain environment similar checks should be performed against domain users and groups.