CIS Logo
tagline: Confidence in the Connected World
Young woman working on a computer

Securing Red Hat Linux An objective, consensus-driven security guideline for the Red Hat Linux Operating Systems.

An objective, consensus-driven security guideline for the Red Hat Linux Operating Systems.

A step-by-step checklist to secure Red Hat Linux:

For Red Hat Linux 8 (CIS Red Hat Enterprise Linux 8 Benchmark version 1.0.0)

CIS has worked with the community since 2009 to publish a benchmark for Red Hat Linux

Join the Red Hat Linux community Arrow

Other CIS Benchmark versions:

For Red Hat Linux (CIS Red Hat Enterprise Linux 5 Benchmark version 2.2.0)

Complete CIS Benchmark Archive Arrow

Want to skip most manual steps?

Arrow Use a CIS Hardened Image

Buy Per Server Hour

CIS Hardened Image available for Benchmark version 2.2.0

Arrow Assess and/or remediate

Only Available to CIS SecureSuite Members

Build Kit available for Benchmark version 2.1.0

CIS-CAT Pro is included with membership and can automatically test for compliance and remediate with this benchmark.

Information Hub : CIS Red Hat Linux Benchmark


CONTROL: 1 --- ADVISORY CONTROL: 0

Pencil Blog post 05 Dec 2019
CONTROL: 2 --- ADVISORY CONTROL: 0

Pencil Blog post 03 Dec 2019
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0