U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS Bottlerocket Benchmark 1.0.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Linux Kernel cpe:/o:linux:linux_kernel (View CVEs)

Checklist Highlights

Checklist Name:
CIS Bottlerocket Benchmark
Checklist ID:
1100
Version:
1.0.0
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
08/11/2022

Checklist Summary:

This document provides prescriptive guidance for establishing a secure configuration posture for Linux systems based on Bottlerocket. Bottlerocket does not include any facilities for interactive use. This means that shells, user accounts, console gettys for local access, and an SSH daemon for remote access are not available. However, Bottlerocket does allow additional host-level services to be defined and executed, provided they are packaged as containers. These additional services are referred to as host containers. It is possible to configure a host container to provide the necessary access to complete this benchmark. Bottlerocket defines an "admin" host container that supports SSH sessions and includes a static shell for running commands directly on the host. It is disabled by default and only intended for break-glass access to troubleshoot production systems, but it can be enabled and used to perform the audit and remediation steps in this guide. The guidance within broadly assumes that operations are being performed as the root user. Operations performed using sudo instead of the root user may produce unexpected results, or fail to make the intended changes to the system. Non-root users may not be able to access certain areas of the system, especially after remediation has been performed. It is advisable to verify root users path integrity and the integrity of any programs being run prior to execution of commands and scripts included in this benchmark. To obtain the latest version of this guide, please visit http://workbench.cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Bottlerocket.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

Not provided.

Product Support:

Not provided.

Point of Contact:

feedback@cisecurity.org

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

new checklist - 2/26/24
updated to FINAL - 3/26/2024

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 03/26/2024