Alibaba Cloud Linux 3 1.0.0 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - Alibaba Cloud Linux 3, v1.0.0
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
Alibaba Cloud Linux 3 | cpe:/o:alibabacloud:alibaba_cloud_linux_3:- (View CVEs) |
Checklist Highlights
- Checklist Name:
- Alibaba Cloud Linux 3
- Checklist ID:
- 1093
- Version:
- 1.0.0
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 02/06/2022
Checklist Summary:
This document provides prescriptive guidance for establishing a secure configuration posture for Alibaba Cloud Linux 3 systems running on x86_64 platforms. The guidance within broadly assumes that operations are being performed as the root user. Operations performed using sudo instead of the root user may produce unexpected results, or fail to make the intended changes to the system. Non-root users may not be able to access certain areas of the system, especially after remediation has been performed. It is advisable to verify root users path integrity and the integrity of any programs being run prior to execution of commands and scripts included in this benchmark. To obtain the latest version of this guide, please visit http://workbench.cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.
Checklist Role:
- Operating System
- Virtualization Server
Known Issues:
Not provided.
Target Audience:
This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Alibaba Cloud Linux 3 on x86_64 platforms.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
To obtain the latest version of this guide, please visit http://workbench.cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.
Disclaimer:
Not provided.
Product Support:
support@cisecurity.org
Point of Contact:
support@cisecurity.org
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
new checklist - 2/23/24 updated to FINAL - 3/23/24
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|