https://store-images.s-microsoft.com/image/apps.58114.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.80938a46-ad32-41b6-b28d-291bf5a676bc

CIS Red Hat Enterprise Linux 7 STIG Benchmark

Center For Internet Security, Inc. 

CIS Red Hat Enterprise Linux 7 STIG Benchmark

Center For Internet Security, Inc. 

Hardened according to a CIS Benchmark - the consensus-based best practice for secure configuration.

This image of Red Hat Enterprise Linux 7 is preconfigured by CIS to the recommendations in the associated CIS Benchmark and STIG. CIS Benchmarks are vendor agnostic, consensus-based security configuration guides both developed and accepted by government, business, industry, and academia. The STIG is the configuration standards for DOD IA and IA-enabled devices or systems. Cloud environments and operating systems are not secure by default. Launching an image hardened according to the CIS STIG Benchmark baselines provides that added security when an organization has to align with those standards. This image has been hardened by CIS and is configured with the majority of the recommendations included in the free PDF version of the CIS STIG Benchmark. The existing consensus-based CIS RHEL 7 Benchmark Level 1 and Level 2 profiles mapped to applicable STIG recommendations have been applied. A new Level 3 profile applied extends the additional requirements from the STIG not covered in the Level 1 and Level 2 profiles. When users are applying CIS Benchmarks and need to be STIG compliant, they will be able to apply all 3 profiles and quickly address the gaps between the original CIS Benchmark and the STIG.

To learn more or access the corresponding CIS STIG Benchmark, please visit the Center for Internet Security website or visit our community platform, CIS WorkBench.

The Benchmark that is the basis for this image was developed for secure solutions that need to incorporate CIS and STIG security for Red Hat Enterprise Linux 7. CIS Benchmarks are developed in a unique consensus-based process comprised of hundreds of security professionals worldwide as de facto, best-practice configuration standards.

https://store-images.s-microsoft.com/image/apps.16437.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.7bfda433-6007-4489-9f3f-04964e025832
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.16437.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.7bfda433-6007-4489-9f3f-04964e025832
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.31332.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.f42962aa-6122-472b-9c3e-5d09dfae1608
https://store-images.s-microsoft.com/image/apps.48469.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.e264b550-3bb3-42a7-8c94-0c1fa189d9b3
https://store-images.s-microsoft.com/image/apps.31065.2806cd9a-f42b-463d-8558-05e3e48a8b82.cb5d543a-1c60-41e5-b46c-a66aa98cfbe5.bb8c8db9-17fc-43c9-8b11-19b7e27d9aea