| AZLX-23-000100 | Amazon Linux 2023 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection. |
| AZLX-23-000110 | Amazon Linux 2023 must ensure cryptographic verification of vendor software packages. |
| AZLX-23-000115 | Amazon Linux 2023 must check the GPG signature of locally installed software packages before installation. |
| AZLX-23-000120 | Amazon Linux 2023 must check the GPG signature of software packages originating from external software repositories before installation. |
| AZLX-23-000125 | Amazon Linux 2023 must have GPG signature verification enabled for all software repositories. |
| AZLX-23-000130 | Amazon Linux 2023 must be a vendor-supported release. |
| AZLX-23-000135 | Amazon Linux 2023 systemd-journald service must be enabled. |
| AZLX-23-000200 | Amazon Linux 2023 must restrict access to the kernel message buffer. |
| AZLX-23-000205 | Amazon Linux 2023 must prevent kernel profiling by nonprivileged users. |
| AZLX-23-000210 | Amazon Linux 2023 must restrict exposed kernel pointer addresses access. |
| AZLX-23-000215 | Amazon Linux 2023 must disable access to network bpf system call from nonprivileged processes. |
| AZLX-23-000220 | Amazon Linux 2023 must restrict usage of ptrace to descendant processes. |
| AZLX-23-000225 | Amazon Linux 2023 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. |
| AZLX-23-000300 | Amazon Linux 2023 must not have the vsftpd package installed. |
| AZLX-23-000305 | Amazon Linux 2023 must not have the sendmail package installed. |
| AZLX-23-000310 | Amazon Linux 2023 must not have the nfs-utils package installed. |
| AZLX-23-000315 | Amazon Linux 2023 must not have the telnet-server package installed. |
| AZLX-23-000320 | Amazon Linux 2023 must not have the gssproxy package installed. |
| AZLX-23-001000 | Amazon Linux 2023 must have the sudo package installed. |
| AZLX-23-001005 | Amazon Linux 2023 must not be configured to bypass password requirements for privilege escalation. |
| AZLX-23-001010 | Amazon Linux 2023 must require reauthentication when using the "sudo" command. |
| AZLX-23-001015 | Amazon Linux 2023 must require users to reauthenticate for privilege escalation. |
| AZLX-23-001020 | Amazon Linux 2023 must require users to provide a password for privilege escalation. |
| AZLX-23-001025 | Amazon Linux 2023 must have the audit package installed. |
| AZLX-23-001030 | Amazon Linux 2023 must produce audit records containing information to establish what type of events occurred. |
| AZLX-23-001035 | Amazon Linux 2023 audispd-plugins package must be installed. |
| AZLX-23-001040 | Amazon Linux 2023 must have the rsyslog package installed. |
| AZLX-23-001045 | Amazon Linux 2023 must monitor remote access methods. |
| AZLX-23-001050 | Amazon Linux 2023 must have the chrony package installed. |
| AZLX-23-001055 | Amazon Linux 2023 chronyd service must be enabled. |
| AZLX-23-001060 | Amazon Linux 2023 must have the Advanced Intrusion Detection Environment (AIDE) package installed. |
| AZLX-23-001065 | Amazon Linux 2023 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered. |
| AZLX-23-001070 | Amazon Linux 2023 must use cryptographic mechanisms to protect the integrity of audit tools. |
| AZLX-23-001075 | Amazon Linux 2023 must have the firewalld package installed. |
| AZLX-23-001080 | Amazon Linux 2023 must have the firewalld servicew active. |
| AZLX-23-001085 | Amazon Linux 2023 must be configured to disable nonessential capabilities. |
| AZLX-23-001090 | Amazon Linux 2023 must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks. |
| AZLX-23-001095 | Amazon Linux 2023 must have the s-nail package installed. |
| AZLX-23-001105 | Amazon Linux 2023 must have the libreswan package installed. |
| AZLX-23-001110 | Amazon Linux 2023 must have the policycoreutils package installed. |
| AZLX-23-001115 | Amazon Linux 2023 must have the pcsc-lite package installed. |
| AZLX-23-001120 | Amazon Linux 2023 must have the packages required for encrypting off-loaded audit logs installed. |
| AZLX-23-001125 | Amazon Linux 2023 must have the opensc package installed. |
| AZLX-23-001130 | Amazon Linux 2023 must have the openssl-pkcs11 package installed. |
| AZLX-23-001180 | Amazon Linux 2023 must have SSH installed. |
| AZLX-23-001185 | Amazon Linux 2023 must implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission. |
| AZLX-23-001195 | Amazon Linux 2023 must have the crypto-policies package installed. |
| AZLX-23-001200 | Amazon Linux 2023 SSH server must be configured to use systemwide crypto policies. |
| AZLX-23-001205 | Amazon Linux 2023 server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-2/140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. |
| AZLX-23-001210 | Amazon Linux 2023 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2/140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. |
| AZLX-23-001215 | Amazon Linux 2023 SSH daemon must not allow Generic Security Service Application Program Interface (GSSAPI) authentication. |
| AZLX-23-001220 | Amazon Linux 2023 SSH daemon must not allow Kerberos authentication. |
| AZLX-23-001225 | Amazon Linux 2023 must force a frequent session key renegotiation for SSH connections to the server. |
| AZLX-23-001230 | Amazon Linux 2023 SSHD must accept public key authentication. |
| AZLX-23-001235 | Amazon Linux 2023 SSHD must not allow blank passwords. |
| AZLX-23-001240 | Amazon Linux 2023 must not permit direct logons to the root account using remote access via SSH. |
| AZLX-23-001245 | Amazon Linux 2023 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive. |
| AZLX-23-001250 | Amazon Linux 2023 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. |
| AZLX-23-001255 | Amazon Linux 2023 must enable the Pluggable Authentication Module (PAM) interface for SSHD. |
| AZLX-23-001260 | Amazon Linux 2023 must implement DOD-approved encryption in the OpenSSL package. |
| AZLX-23-001265 | Amazon Linux 2023 must implement DOD-approved TLS encryption in the OpenSSL package. |
| AZLX-23-001270 | Amazon Linux 2023 must implement a FIPS 140-2/140-3 compliant systemwide cryptographic policy. |
| AZLX-23-001275 | Amazon Linux 2023 must implement DOD-approved encryption to protect the confidentiality of remote access sessions. |
| AZLX-23-001280 | Amazon Linux 2023 must enable FIPS mode. |
| AZLX-23-001285 | Amazon Linux 2023 crypto policy must not be overridden. |
| AZLX-23-001290 | Amazon Linux 2023 must enable certificate-based smart card authentication. |
| AZLX-23-001295 | Amazon Linux 2023 must map the authenticated identity to the user or group account for PKI-based authentication. |
| AZLX-23-001300 | Amazon Linux 2023 must implement certificate status checking for multifactor authentication. |
| AZLX-23-001305 | Amazon Linux 2023 must prohibit the use of cached authenticators after one day. |
| AZLX-23-001310 | Amazon Linux 2023, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. |
| AZLX-23-001315 | Amazon Linux 2023, for PKI-based authentication, must enforce authorized access to the corresponding private key. |
| AZLX-23-002000 | Amazon Linux 2023 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system. |
| AZLX-23-002005 | Amazon Linux 2023 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a SSH logon. |
| AZLX-23-002015 | Amazon Linux 2023 must allocate audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility. |
| AZLX-23-002020 | Amazon Linux 2023 must use a separate file system for the system audit data path. |
| AZLX-23-002025 | Amazon Linux 2023 must label all off-loaded audit logs before sending them to the central log server. |
| AZLX-23-002030 | Amazon Linux 2023 must take appropriate action when the internal event queue is full. |
| AZLX-23-002035 | Amazon Linux 2023 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity. |
| AZLX-23-002040 | Amazon Linux 2023 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization. |
| AZLX-23-002045 | Amazon Linux 2023 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity. |
| AZLX-23-002050 | Amazon Linux 2023 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity. |
| AZLX-23-002055 | Amazon Linux 2023 must immediately notify the system administrator (SA) and information system security officer (ISSO), at a minimum, of an audit processing failure event. |
| AZLX-23-002060 | Amazon Linux 2023 must be configured to off-load audit records onto a different system from the system being audited via syslog. |
| AZLX-23-002065 | Amazon Linux 2023 must authenticate the remote logging server for off-loading audit logs via rsyslog. |
| AZLX-23-002070 | Amazon Linux 2023 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited via rsyslog. |
| AZLX-23-002075 | Amazon Linux 2023 must encrypt via the gtls driver the transfer of audit records off-loaded onto a different system or media from the system being audited via rsyslog. |
| AZLX-23-002080 | Amazon Linux 2023 must be configured to off-load audit records onto a different system from the system being audited via syslog. |
| AZLX-23-002085 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers. |
| AZLX-23-002090 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory. |
| AZLX-23-002095 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group. |
| AZLX-23-002100 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow. |
| AZLX-23-002105 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd. |
| AZLX-23-002110 | Amazon Linux 2023 must audit uses of the "execve" system call. |
| AZLX-23-002115 | Amazon Linux 2023 must audit all uses of the chmod, fchmod, and fchmodat system calls. |
| AZLX-23-002120 | Amazon Linux 2023 must audit all uses of the chown, fchown, fchownat, and lchown system calls. |
| AZLX-23-002125 | Amazon Linux 2023 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls. |
| AZLX-23-002130 | Amazon Linux 2023 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls. |
| AZLX-23-002135 | Amazon Linux 2023 must audit all uses of the init_module and finit_module system calls. |
| AZLX-23-002140 | Amazon Linux 2023 must audit all uses of the create_module system call. |
| AZLX-23-002145 | Amazon Linux 2023 must audit all uses of the kmod command. |
| AZLX-23-002150 | Amazon Linux 2023 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls. |
| AZLX-23-002155 | Amazon Linux 2023 must audit all uses of the chcon command. |
| AZLX-23-002160 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock. |
| AZLX-23-002165 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog. |
| AZLX-23-002175 | Amazon Linux 2023 must audit all uses of the init command. |
| AZLX-23-002180 | Amazon Linux 2023 must audit all uses of the reboot command. |
| AZLX-23-002185 | Amazon Linux 2023 must audit all uses of the shutdown command. |
| AZLX-23-002190 | Amazon Linux 2023 audit tools must have a mode of "0755" or less permissive. |
| AZLX-23-002195 | Amazon Linux 2023 audit tools must be owned by root. |
| AZLX-23-002200 | Amazon Linux 2023 audit tools must be group-owned by root. |
| AZLX-23-002205 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd. |
| AZLX-23-002210 | Amazon Linux 2023 must audit all successful/unsuccessful uses of the chage command. |
| AZLX-23-002215 | Amazon Linux 2023 must alert the information system security officer (ISSO) and system administrator (SA), at a minimum, in the event of an audit processing failure. |
| AZLX-23-002220 | Amazon Linux 2023 must off-load audit records onto a different system in the event the audit storage volume is full. |
| AZLX-23-002225 | Amazon Linux 2023 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access. |
| AZLX-23-002230 | Amazon Linux 2023 audit log directory must be owned by root to prevent unauthorized read access. |
| AZLX-23-002235 | Amazon Linux 2023 audit logs file must have mode "0600" or less permissive to prevent unauthorized access to the audit log. |
| AZLX-23-002240 | Amazon Linux 2023 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. |
| AZLX-23-002245 | Amazon Linux 2023 must audit all uses of the sudo command. |
| AZLX-23-002250 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd. |
| AZLX-23-002255 | Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. |
| AZLX-23-002260 | Amazon Linux 2023 must produce audit records containing information to establish the identity of any individual or process associated with the event. |
| AZLX-23-002265 | Amazon Linux 2023 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access. |
| AZLX-23-002270 | Amazon Linux 2023 must ensure the audit log directory be owned by root to prevent unauthorized read access. |
| AZLX-23-002275 | Amazon Linux 2023 audit logs file must have mode "0600" or less permissive to prevent unauthorized access to the audit log. |
| AZLX-23-002280 | Amazon Linux 2023 library directories must be group-owned by root or a system account. |
| AZLX-23-002285 | Amazon Linux 2023 library directories must have mode "755" or less permissive. |
| AZLX-23-002290 | Amazon Linux 2023 library files must have mode "755" or less permissive. |
| AZLX-23-002295 | Amazon Linux 2023 library files must be owned by root. |
| AZLX-23-002300 | Amazon Linux 2023 library files must be group-owned by root or a system account. |
| AZLX-23-002305 | Amazon Linux 2023 library directories must be owned by root. |
| AZLX-23-002315 | Amazon Linux 2023 must ensure the /var/log directory have mode "0755" or less permissive. |
| AZLX-23-002320 | Amazon Linux 2023 must ensure the /var/log directory be owned by root. |
| AZLX-23-002325 | Amazon Linux 2023 must ensure the /var/log directory be group-owned by root. |
| AZLX-23-002330 | Amazon Linux 2023 must ensure the /var/log/messages file have mode "0640" or less permissive. |
| AZLX-23-002335 | Amazon Linux 2023 must ensure the /var/log/messages file be group-owned by root. |
| AZLX-23-002340 | Amazon Linux 2023 must ensure the /var/log/messages file be owned by root. |
| AZLX-23-002345 | Amazon Linux 2023 system commands must be owned by root. |
| AZLX-23-002350 | Amazon Linux 2023 system commands must be group-owned by root or a system account. |
| AZLX-23-002355 | Amazon Linux 2023 must enforce password complexity by requiring that at least one uppercase character be used. |
| AZLX-23-002360 | Amazon Linux 2023 must enforce password complexity by requiring that at least one lowercase character be used. |
| AZLX-23-002365 | Amazon Linux 2023 must enforce password complexity by requiring that at least one numeric character be used. |
| AZLX-23-002370 | Amazon Linux 2023 must require the change of at least 50 percent of the total number of characters when passwords are changed. |
| AZLX-23-002375 | Amazon Linux 2023 must enforce a minimum 15-character password length. |
| AZLX-23-002380 | Amazon Linux 2023 must enforce password complexity by requiring that at least one special character be used. |
| AZLX-23-002385 | Amazon Linux 2023 must enforce password complexity rules for the root account. |
| AZLX-23-002390 | Amazon Linux 2023 must prevent the use of dictionary words for passwords. |
| AZLX-23-002395 | Amazon Linux 2023 must limit the number of concurrent sessions to ten for all accounts and/or account types. |
| AZLX-23-002396 | Amazon Linux 2023 must automatically exit interactive command shell user sessions after 15 minutes of inactivity. |
| AZLX-23-002400 | Amazon Linux 2023 must enforce 24 hours/1 day as the minimum password lifetime. |
| AZLX-23-002405 | Amazon Linux 2023 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt. |
| AZLX-23-002410 | Amazon Linux 2023 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files. |
| AZLX-23-002415 | Amazon Linux 2023 must automatically remove or disable temporary user accounts after 72 hours. |
| AZLX-23-002420 | Amazon Linux 2023 must automatically lock an account when three unsuccessful logon attempts occur. |
| AZLX-23-002425 | Amazon Linux 2023 must be able to enforce a 60-day maximum password lifetime restriction. |
| AZLX-23-002430 | Amazon Linux 2023 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. |
| AZLX-23-002435 | Amazon Linux 2023 must automatically expire temporary accounts within 72 hours. |
| AZLX-23-002440 | Amazon Linux 2023 must restrict the use of the "su" command. |
| AZLX-23-002445 | Amazon Linux 2023 must enable the SELinux targeted policy. |
| AZLX-23-002450 | Amazon Linux 2023 must use a Linux Security Module configured to enforce limits on system services. |
| AZLX-23-002455 | Amazon Linux 2023 must automatically lock an account when three unsuccessful logon attempts occur. |
| AZLX-23-002460 | Amazon Linux 2023 must automatically lock the root account until the root account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. |
| AZLX-23-002465 | Amazon Linux 2023 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes occur. |
| AZLX-23-002470 | Amazon Linux 2023 must maintain an account lock until the locked account is released by an administrator. |
| AZLX-23-002475 | Amazon Linux 2023 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL) and vulnerability assessments. |
| AZLX-23-002480 | Amazon Linux 2023 must insure all interactive users have a primary group that exists. |
| AZLX-23-002485 | Amazon Linux 2023 must ensure all interactive users have unique User IDs (UIDs). |
| AZLX-23-002489 | Amazon Linux 2023 must ensure the password complexity module is enabled in the password-auth file. |
| AZLX-23-002490 | Amazon Linux 2023 password-auth must be configured to use a sufficient number of hashing rounds. |
| AZLX-23-002495 | Amazon Linux 2023 system-auth must be configured to use a sufficient number of hashing rounds. |
| AZLX-23-002500 | Amazon Linux 2023 must ensure a sticky bit be set on all public directories. |
| AZLX-23-002505 | Amazon Linux 2023 must ensure all world-writable directories be owned by root, sys, bin, or an application user. |
| AZLX-23-002510 | Amazon Linux 2023 must terminate idle user sessions. |
| AZLX-23-002515 | Amazon Linux 2023 must enable auditing of processes that start prior to the audit daemon. |
| AZLX-23-002520 | Amazon Linux 2023 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon. |
| AZLX-23-002535 | Amazon Linux 2023 must enable discretionary access control on hardlinks. |
| AZLX-23-002540 | Amazon Linux 2023 must enable kernel parameters to enforce discretionary access control on symlinks. |
| AZLX-23-002555 | Amazon Linux 2023 debug-shell systemd service must be disabled. |
| AZLX-23-002560 | Amazon Linux 2023 chrony must be configured with a maximum interval of 24 hours between requests sent to a USNO server or a time server designated for the appropriate DOD network. |
| AZLX-23-002565 | Amazon Linux 2023 must synchronize internal information system clocks to the authoritative time source at least every 24 hours. |
| AZLX-23-002570 | Amazon Linux 2023 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered. |
| AZLX-23-002575 | Amazon Linux 2023 must prevent the loading of a new kernel for later execution. |
| AZLX-23-002580 | Amazon Linux 2023 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory. |
| AZLX-23-002585 | Amazon Linux 2023 must mount /dev/shm with the nodev option. |
| AZLX-23-002590 | Amazon Linux 2023 must mount /dev/shm with the nosuid option. |
| AZLX-23-002595 | Amazon Linux 2023 must ensure the pcscd service is active. |
| AZLX-23-002600 | Amazon Linux 2023 file system automount function must be disabled unless required. |
| AZLX-23-002605 | Amazon Linux 2023 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures are configured on impacted network interfaces. |
| AZLX-23-002610 | Amazon Linux 2023 must implement nonexecutable data to protect its memory from unauthorized code execution. |
| AZLX-23-002615 | Amazon Linux 2023 must remove all software components after updated versions have been installed. |
| AZLX-23-002620 | Amazon Linux 2023 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file. |
| AZLX-23-005000 | Amazon Linux 2023 audit system must protect logon user identifiers (UIDs) from unauthorized change. |