Controls requiring end-user configuration
The following controls are excluded from hardened Linux images. Applicability varies by image type. VM images typically require bootloader and SSH configuration, while container images may require runtime-level security settings.
Configure these controls based on your environment and security policies.
On this page:
Virtual machine images
-
CIS 1.3.1: Ensure the
bootloaderpassword is set. -
CIS 1.3.2: Verify the UEFI GRUB2 bootloader configuration:
-
UEFI Boot Loader
grub.cfggroup ownership -
/boot/efi/EFI/redhat/user.cfggroup ownership -
UEFI Boot Loader
grub.cfguser ownership -
/boot/efi/EFI/redhat/user.cfguser ownership -
UEFI Boot Loader
grub.cfgpermissions -
/boot/efi/EFI/redhat/user.cfgpermissions
-
-
CIS 4.2.4: Ensure SSH daemon access is configured
-
CIS 1.4.1: Ensure the
bootloaderpassword is set -
CIS 5.1.4: Ensure
sshdaccess is configured -
CIS 6.1.2.1: Configure
systemd-journal-remote-
CIS 6.1.2.1.2: Ensure
systemd-journal-uploadauthentication is configured -
CIS 6.1.2.1.3: Ensure
systemd-journal-uploadis enabled and active
-
-
CIS 4.2.1: Ensure
UFW(Uncomplicated Firewall) is installed -
CIS 6.1.2: Configure
journald-
CIS 6.1.2.2: Ensure
journald ForwardToSyslogis disabled
-
-
CIS 2.3.1: Ensure time synchronization is in use
-
CIS 2.3.1.1: Ensure a single time synchronization daemon is in use
-
-
CIS 1.4.1: Ensure
bootloaderpassword is set -
CIS 5.1.4: Ensure
sshdaccess is configured
Container images
-
CIS 4.4.1.2: Ensure the latest version of
authselectis installed
-
CIS 5.3.1.2: Ensure the latest version of
authselectis installed
-
CIS 5.3.1.3: Ensure
libpam-pwqualityis installed (automated)