Definition of Australian Signals Directorate Information Security Manual for rhel10

based on https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism

0418: Credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.

Description: None

Levels:

Automated: yes

Selections:

0421: Passphrases used for single-factor authentication are at least 4 random words with a total minimum length of 14 characters, unless more stringent requirements apply.

Description: None

Levels:

Automated: yes

Selections:

0422: Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.

Description: None

Levels:

Automated: yes

Selections:

0484: SSH daemon configuration

Description: None

Levels:

Automated: no

Selections:

0487: Passwordless SSH Connections Configuration

Description: None

Levels:

Automated: no

No rules selected

0582: Central Logging for OS Events

Description: None

Levels:

Automated: yes

Selections:

0846: All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.

Description: None

Levels:

Automated: yes

Selections:

0974: Multi-factor authentication is used to authenticate unprivileged users of systems.

Description: None

Levels:

Automated: no

Selections:

0988: An accurate time source is established and used consistently across systems to assist with identifying connections between events.

Description: None

Levels:

Automated: yes

Selections:

1034: A HIPS is implemented on critical servers and high-value servers.

Description: None

Levels:

Automated: yes

Selections:

1055: LAN Manager and NT LAN Manager authentication methods are disabled.

Description: None

Levels:

Automated: no

Selections:

1173: Multi-factor authentication is used to authenticate privileged users of systems.

Description: None

Levels:

Automated: yes

Selections:

1277: Data communicated between database servers and web servers is encrypted.

Description: None

Levels:

Automated: no

Selections:

1288: Files imported or exported via gateways or CDSs undergo antivirus scanning using multiple different scanning engines.

Description: None

Levels:

Automated: no

Selections:

1311: SNMP version 1 and SNMP version 2 are not used on networks.

Description: None

Levels:

Automated: no

Selections:

1315: The administrative interface on wireless access points is disabled for wireless network connections.

Description: None

Levels:

Automated: yes

Selections:

1319: Static addressing is not used for assigning IP addresses on wireless networks.

Description: None

Levels:

Automated: no

Selections:

1341: A HIPS is implemented on workstations.

Description: None

Levels:

Automated: yes

Selections:

1386: Network management traffic can only originate from administrative infrastructure.

Description: None

Levels:

Automated: no

Selections:

1401: Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.

Description: None

Levels:

Automated: no

Selections:

1402: Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database

Description: None

Levels:

Automated: yes

Selections:

1405: A centralised event logging facility is implemented and event logs are sent to the facility as soon as possible after they occur.

Description: None

Levels:

Automated: yes

Selections:

1416: A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.

Description: None

Levels:

Automated: yes

Selections:

1417: Antivirus software is implemented on workstations and server.

Description: None

Levels:

Automated: no

Selections:

1418: If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces

Description: None

Levels:

Automated: yes

Selections:

1446: When using elliptic curve cryptography, a suitable curve from NIST SP 800-186 is used.

Description: None

Levels:

Automated: yes

Selections:

1449: SSH private keys are protected with a passphrase or a key encryption key

Description: None

Levels:

Automated: no

Selections:

1467: The latest release of office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are used.

Description: None

Levels:

Automated: yes

Selections:

1483: The latest release of internet-facing server applications are used.

Description: None

Levels:

Automated: yes

Selections:

1491: Unprivileged users are prevented from running script execution engines.

Description: None

Levels:

Automated: yes

Selections:

1493: Software registers for workstations, servers, network devices and other ICT equipment are developed, implemented, maintained and verified on a regular basis.

Description: None

Levels:

Automated: yes

Selections:

1504: Multi-factor authentication is used to authenticate users to their organisation’s online services that process, store or communicate their organisation’s sensitive data.

Description: None

Levels:

Automated: no

Selections:

1505: Multi-factor authentication is used to authenticate users of data repositories.

Description: None

Levels:

Automated: no

Selections:

1506: The use of SSH version 1 is disabled for SSH connections.

Description: None

Levels:

Automated: no

No rules selected

1546: Users are authenticated before they are granted access to a system and its resources

Description: None

Levels:

Automated: yes

Selections:

1552: All web application content is offered exclusively using HTTPS.

Description: None

Levels:

Automated: no

Selections:

1557: Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.

Description: None

Levels:

Automated: no

Selections:

1558: Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.

Description: None

Levels:

Automated: yes

Selections:

1559: Memorised secrets used for multi-factor authentication are a minimum of 6 characters, unless more stringent requirements apply.

Description: None

Levels:

Automated: yes

Selections:

1560: Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters

Description: None

Levels:

Automated: yes

Selections:

1561: Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.

Description: None

Levels:

Automated: yes

Selections: