U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS Red Hat Enterprise Linux 5 Benchmark 2.2.1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Red Hat Enterprise Linux 5 cpe:/o:redhat:enterprise_linux:5 (View CVEs)

Checklist Highlights

Checklist Name:
CIS Red Hat Enterprise Linux 5 Benchmark
Checklist ID:
422
Version:
2.2.1
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
12/16/2011

Checklist Summary:

This document, Security Configuration Benchmark for Red Hat Enterprise Linux 5 provides prescriptive guidance for establishing a secure configuration posture for Red Hat Enterprise Linux (RHEL) versions 5.0 - 5.5 running on x86 platforms. This guide was tested against RHEL 5.5 as installed by RHEL5_U5_i386_DVD. To obtain the latest version of this guide, please visit http://cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.

Checklist Role:

  • Server Operating System

Known Issues:

For an to date list of known issues please visit the following URL: https://community.cisecurity.org/collab/public/index.php?path_info=projects%2F7%2Ftickets

Target Audience:

This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Red Hat Enterprise Linux 5.

Target Operational Environment:

  • Standalone
  • Managed
  • Specialized Security-Limited Functionality (SSLF)
  • Legacy

Testing Information:

This guide was tested against RHEL 5.5 (x86/x64)and 5.6 (x86/x64).

Regulatory Compliance:

Not Applicable

Comments/Warnings/Miscellaneous:

Not Applicable

Disclaimer:

See http://benchmarks.cisecurity.org/termsofuse.

Product Support:

CIS is not the product vendor. The warranty of the product will not be affected by applying this checklist.

Point of Contact:

If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org or create a ticket at the following URL (preferred): https://community.cisecurity.org/collab/public/index.php?path_info=projects%2F7%2Ftickets

Sponsor:

Center for Internet Security

Licensing:

See http://benchmarks.cisecurity.org/termsofuse.

Change History:

Updated URL - 7/26/19
updated to 2.2.0  - 1/3/2020
updated benchmark per CIS - 2/20/24

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 02/20/2024