
File Find
The File Find module reports weaknesses in the file permissions and the
configuration files.
Table 2-3 gives a list of the checks and their CIS sections.
Table 2-3
Checks and CIS sections
CIS sectionCheck
2.3, 3.2, 4.14, 4.3, 4.4, 5.1, 5.2, 6.2, 7.1, 7.2,
7.9, 8.1, 8.2, 8.4, 8.6, 8.8, 8.10, 9.1, 9.10, 9.11,
9.4, 10.2, 10.3, 11.1.11, 11.1.12, 11.1.13,
11.1.14, 11.1.15, 11.4.1
File Content Search
7.7Setgid executable files
7.7Setuid executable files
7.8Unowned Directories/Files
7.5World writable directories with sticky bit
7.6World writable files
Login Parameters
The Login Parameters module reports accounts, resources, and settings that are
not complaint with the policies.
Table 2-4 gives a list of the checks and their CIS sections.
Table 2-4
Checks and CIS sections
CIS sectionCheck
9.3Inactive accounts
9.1Locked Accounts
10.1Warning Banners
Network Integrity
The Network Integrity module reports the system configuration settings that
pertain to authentication and remote access.
15Policy modules
File Find
Comentarios a estos manuales