====== CentOS 7 ====== Download CIS Benchmark {{ :centos7:cis_centos_linux_7_benchmark_v2.1.0.pdf |CIS CentOS Linux 7 Benchmark - v2.1.0}} ===== Overview ===== This document provides prescriptive guidance for establishing a secure configuration posture for CentOS Linux 7 systems running on x86 and x64 platforms. This document was tested against CentOS 7.2. \\ \\ This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Linux on a x86 platform. \\ ==== Scoring Information ==== A scoring status indicates whether compliance with the given recommendation impacts the assessed target's benchmark score. The following scoring statuses are used in this benchmark: \\ \\ **Scored** \\ Failure to comply with "Scored" recommendations will decrease the final benchmark score. Compliance with "Scored" recommendations will increase the final benchmark score. \\ \\ **Not scored** \\ Failure to comply with "Not Scored" recommendations will not decrease the final benchmark score. Compliance with "Not Scored" recommendations will not increase the final benchmark score.\\ \\ ==== Profile Definitions ==== The following configuration profiles are defined by this Benchmark:\\ \\ **Level 1 - Server** \\ Items in this profile intend to: * be practical and prudent; * provide a clear security benefit; and * not inhibit the utility of the technology beyond acceptable means. This profile is intended for servers. \\ \\ **Level 2 - Server** \\ This profile extends the "Level 1 - Server" profile. Items in this profile exhibit one or more of the following characteristics: * are intended for environments or use cases where security is paramount. * acts as defense in depth measure. * may negatively inhibit the utility or performance of the technology. This profile is intended for servers. \\ \\ **Level 1 - Workstation** \\ Items in this profile intend to: * be practical and prudent; * provide a clear security benefit; and * not inhibit the utility of the technology beyond acceptable means. This profile is intended for workstations. \\ \\ **Level 2 - Workstation** \\ This profile extends the "Level 1 - Workstation" profile. Items in this profile exhibit one or more of the following characteristics: * are intended for environments or use cases where security is paramount. * acts as defense in depth measure. * may negatively inhibit the utility or performance of the technology. This profile is intended for workstations. \\ ===== List of content ===== {{indexmenu>.:#4 |context}}