All Projects → mrC2C → cis-benchmark-centOS-8

mrC2C / cis-benchmark-centOS-8

Licence: Apache-2.0 license
Auditing Script based on CIS-BENCHMARK CENTOS 8

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to cis-benchmark-centOS-8

CIS-Ubuntu-20.04-Ansible
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Stars: ✭ 150 (+341.18%)
Mutual labels:  cis, hardening, cis-benchmark, cis-benchmarks
cis benchmarks audit
Simple command line tool to check for compliance against CIS Benchmarks
Stars: ✭ 182 (+435.29%)
Mutual labels:  cis, audit, hardening, cis-benchmark
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+13314.71%)
Mutual labels:  cis, hardening, cis-benchmark
The Practical Linux Hardening Guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Stars: ✭ 8,790 (+25752.94%)
Mutual labels:  cis, audit, hardening
inspec-gke-cis-benchmark
GKE CIS 1.1.0 Benchmark InSpec Profile
Stars: ✭ 27 (-20.59%)
Mutual labels:  auditing, cis
pg-audit-json
Simple, easily customised trigger-based auditing for PostgreSQL (Postgres). See also pgaudit.
Stars: ✭ 34 (+0%)
Mutual labels:  auditing, audit
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+26773.53%)
Mutual labels:  auditing, hardening
Laravel Auditing
Record the change log from models in Laravel
Stars: ✭ 2,210 (+6400%)
Mutual labels:  auditing, audit
Windows Secure Host Baseline
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
Stars: ✭ 1,288 (+3688.24%)
Mutual labels:  auditing, audit
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+23564.71%)
Mutual labels:  hardening, cis-benchmark
audit
A common audit framework for java application
Stars: ✭ 28 (-17.65%)
Mutual labels:  auditing, audit
postgres-baseline
DevSec PostgreSQL Baseline - InSpec Profile
Stars: ✭ 47 (+38.24%)
Mutual labels:  audit, hardening
lxd-probe
Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark specification
Stars: ✭ 14 (-58.82%)
Mutual labels:  audit, cis-benchmark
Django Easy Audit
Yet another Django audit log app, hopefully the simplest one.
Stars: ✭ 289 (+750%)
Mutual labels:  auditing, audit
Audit-Test-Automation
The Audit Test Automation Package gives you the ability to get an overview about the compliance status of several systems. You can easily create HTML-reports and have a transparent overview over compliance and non-compliance of explicit setttings and configurations in comparison to industry standards and hardening guides.
Stars: ✭ 37 (+8.82%)
Mutual labels:  cis, audit
Maplesyrup
Assesses CPU security of embedded devices. #nsacyber
Stars: ✭ 121 (+255.88%)
Mutual labels:  auditing, audit
Ssh Baseline
DevSec SSH Baseline - InSpec Profile
Stars: ✭ 192 (+464.71%)
Mutual labels:  audit, hardening
centos-cis-benchmark
CIS CentOS Linux 7 Benchmark
Stars: ✭ 64 (+88.24%)
Mutual labels:  cis, cis-benchmark
UBUNTU20-CIS
Ansible role for Ubuntu 2004 CIS Baseline
Stars: ✭ 136 (+300%)
Mutual labels:  cis, cis-benchmark
first-steps-and-hardening-in-ubuntu-server-and-docker
First Steps in Ubuntu (Server) / Hardening and Config With Docker
Stars: ✭ 28 (-17.65%)
Mutual labels:  hardening, bash-script

cis-benchmark-centOS-8

Auditing Script based on CIS-BENCHMARK CENTOS 8 v1.0.0

INSTRUCTION

Download:

 git clone https://github.com/mrC2C/cis-benchmark-centOS-8.git

Permission granted to the script:

 chmod 750 cis-benchmark-centOS-8/centOS8.sh

Options:

 OPTIONS: 
    -h,     --help          Display the help message
    -ls,    --list
    -l,     --level         Indicate the level 1 or 2 for server/workstation to audit
    -e,     --exclude       Indicate the level and categories id to be excluded from auditing. FORMAT: LEVEL.CAT_ID meaning level first followed by categories id e.g. 1.1.1  ==> meaning exclude level 1 and categories id 1.1 
    -vv,    --verbose       Display the debug file, while the script is running
    -sh,    --show          Display results from the json file 

 EXAMPLE:
   sudo ./centOS8.sh -e 1.1.1,2.1.1 -vv    #Execute the script to audit for both LEVEL 1 & 2 but exclude categories id 1.1
   sudo ./centOS8.sh -l 1 -e 1.2.1,1.6.1 -vv
   sudo ./centOS8.sh -l 2 -e 2.1.1, 2.3.1 -vv
   sudo ./centOS8.sh -vv -sh               #Execute the script to audit for both LEVELs and display the results

Run:

  cd cis-benchmark-centOS-8/
  sudo ./centOS8.sh -vv       #If you want to run everything in verbose mode

Log Directory:

 /var/log/centOS8_audit
 |_____ debug        #debug file
 |_____ json_log     #Go to this directory, if you want to see the results. It is formatted into a json file.

How the function display the result from the json file?

 In the json file,
 audit
 |____ level
 |____ chapters (for e.g. "one")
       |________ categories (for e.g. 1.1) => the function will display results of its no. of pass, fail and null. 
                 |___________ sub-categories (for e.g. id 1.1.1)
 
 For example, its output will be
  
 LEVEL 1
 =========
 Chp one
 =========
     --   -----------                    ----  ----  ----
     ID   Description                    Pass  Fail  Null
     --   -----------                    ----  ----  ----
     1.1  filesystem configuration       3     6     3
     1.2  software updates               1     0     2
     1.3  sudo                           1     2     0
     1.4  filesystem integrity checking  1     1     0
     1.5  secure boot settings           1     2     0
     1.6  additional process hardening   1     1     0
     1.7  warning banners                2     3     1

Note:

Hi all, this is my first time creating a project on GITHUB. Since, this is my first time doing such project, I would like to ask you guys to help me check it out. Feel free to send feedback on what to improve on or add any new features.

Do note that function 'no_exist' will take a while due to the number of checks it need to process.

If you like the script, do leave a star :)

UPDATES:

What's New?

Added a new function to display results from the json file.

What's Next?

I m looking for contributors to enrich and enhance this project, to ensure the script is more effective.

Update 1.0.1.0

Added new function to display results from json file.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].