All Projects → massyn → centos-cis-benchmark

massyn / centos-cis-benchmark

Licence: MIT license
CIS CentOS Linux 7 Benchmark

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to centos-cis-benchmark

Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+7026.56%)
Mutual labels:  cis, cis-benchmark
cis benchmarks audit
Simple command line tool to check for compliance against CIS Benchmarks
Stars: ✭ 182 (+184.38%)
Mutual labels:  cis, cis-benchmark
CIS-Ubuntu-20.04-Ansible
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Stars: ✭ 150 (+134.38%)
Mutual labels:  cis, cis-benchmark
UBUNTU20-CIS
Ansible role for Ubuntu 2004 CIS Baseline
Stars: ✭ 136 (+112.5%)
Mutual labels:  cis, cis-benchmark
cis-benchmark-centOS-8
Auditing Script based on CIS-BENCHMARK CENTOS 8
Stars: ✭ 34 (-46.87%)
Mutual labels:  cis, cis-benchmark
The Practical Linux Hardening Guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Stars: ✭ 8,790 (+13634.38%)
Mutual labels:  cis
cli
The universal GraphQL API and CSPM tool for AWS, Azure, GCP, K8s, and tencent.
Stars: ✭ 811 (+1167.19%)
Mutual labels:  cis
CIS-for-macOS-High-Sierra-CP
No description or website provided.
Stars: ✭ 36 (-43.75%)
Mutual labels:  cis
c3
𝗖𝟯 provides compliant AWS CDK components to various security standards.
Stars: ✭ 24 (-62.5%)
Mutual labels:  cis
RHEL7-CIS
Ansible RHEL 7 - CIS Benchmark Hardening Script
Stars: ✭ 28 (-56.25%)
Mutual labels:  cis-benchmark
lxd-probe
Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark specification
Stars: ✭ 14 (-78.12%)
Mutual labels:  cis-benchmark
kubernetes-security-benchmark
A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources
Stars: ✭ 27 (-57.81%)
Mutual labels:  cis
CIS-for-macOS-High-Sierra
No description or website provided.
Stars: ✭ 15 (-76.56%)
Mutual labels:  cis
aws-security-hub-response-and-remediation
Pre-configured response & remediation playbooks for AWS Security Hub
Stars: ✭ 58 (-9.37%)
Mutual labels:  cis-benchmark
UBUNTU18-CIS
CIS Baseline Ansible Role for Ubuntu 18
Stars: ✭ 20 (-68.75%)
Mutual labels:  cis
CIS-for-macOS-Sierra-CP
CIS for macOS 10.12 remediated with script and configuration profiles
Stars: ✭ 23 (-64.06%)
Mutual labels:  cis
Audit-Test-Automation
The Audit Test Automation Package gives you the ability to get an overview about the compliance status of several systems. You can easily create HTML-reports and have a transparent overview over compliance and non-compliance of explicit setttings and configurations in comparison to industry standards and hardening guides.
Stars: ✭ 37 (-42.19%)
Mutual labels:  cis
k8s-security-policies
This repository provides a security policies library that is used for securing Kubernetes clusters configurations. The security policies are created based on CIS Kubernetes benchmark and rules defined in Kubesec.io.
Stars: ✭ 160 (+150%)
Mutual labels:  cis
terraform-aws-secure-vpc
A terraform module to create a VPC with secure default configurations.
Stars: ✭ 13 (-79.69%)
Mutual labels:  cis-benchmark
slidefiles
[WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
Stars: ✭ 2,033 (+3076.56%)
Mutual labels:  cis

centos-cis-benchmark

Based on CIS CentOS Linux 7 Benchmark v2.2.0 - 12-27-2017

How to run the audit

To run the audit, execute these steps

git clone https://github.com/massyn/centos-cis-benchmark
cd centos-cis-benchmark
sudo bash run-cis-benchmark.sh

The following tests must be executed manually. These are dependent on your own site configuration, and needs a manual check. By default, the audit scripts will fail these checks.

  • 1.2.1 - Ensure package manager repositories are configured (Not Scored)
  • 3.4.2 - Ensure /etc/hosts.allow is configured (Scored)
  • 3.4.3 - Ensure /etc/hosts.deny is configured (Scored)
  • 3.6.4 - Ensure outbound and established connections are configured (Not Scored)
  • 5.5 - Ensure root login is restricted to system console (Not Scored)

Remediation

Some remediation scripts are also included, however use them at your own risk. While most of the scripts would correct the problem, they could cause outages on your system, so be sure to have a proper roll back plan before you execute the scripts.

Acknowledgement

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].