CIS Red Hat Enterprise Linux 5 Benchmark 2.2.1 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - CIS Red Hat Enterprise Linux 5 Benchmark v2.2.1
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
Red Hat Enterprise Linux 5 | cpe:/o:redhat:enterprise_linux:5 (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS Red Hat Enterprise Linux 5 Benchmark
- Checklist ID:
- 422
- Version:
- 2.2.1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 12/16/2011
Checklist Summary:
This document, Security Configuration Benchmark for Red Hat Enterprise Linux 5 provides prescriptive guidance for establishing a secure configuration posture for Red Hat Enterprise Linux (RHEL) versions 5.0 - 5.5 running on x86 platforms. This guide was tested against RHEL 5.5 as installed by RHEL5_U5_i386_DVD. To obtain the latest version of this guide, please visit http://cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.
Checklist Role:
- Server Operating System
Known Issues:
For an to date list of known issues please visit the following URL: https://community.cisecurity.org/collab/public/index.php?path_info=projects%2F7%2Ftickets
Target Audience:
This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Red Hat Enterprise Linux 5.
Target Operational Environment:
- Standalone
- Managed
- Specialized Security-Limited Functionality (SSLF)
- Legacy
Testing Information:
This guide was tested against RHEL 5.5 (x86/x64)and 5.6 (x86/x64).
Regulatory Compliance:
Not Applicable
Comments/Warnings/Miscellaneous:
Not Applicable
Disclaimer:
See http://benchmarks.cisecurity.org/termsofuse.
Product Support:
CIS is not the product vendor. The warranty of the product will not be affected by applying this checklist.
Point of Contact:
If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org or create a ticket at the following URL (preferred): https://community.cisecurity.org/collab/public/index.php?path_info=projects%2F7%2Ftickets
Sponsor:
Center for Internet Security
Licensing:
See http://benchmarks.cisecurity.org/termsofuse.
Change History:
Updated URL - 7/26/19 updated to 2.2.0 - 1/3/2020 updated benchmark per CIS - 2/20/24
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|