Red Hat Enterprise Linux
This CIS Benchmark is the product of a community consensus process and consists of secure configuration guidelines developed for Red Hat Enterprise Linux
CIS Benchmarks are freely available in PDF format for non-commercial use:
Download Latest CIS BenchmarkIncluded in this Benchmark
CIS Benchmark
Safeguard IT systems against cyber threats with these CIS Benchmarks. Click to download a PDF from the list of available versions.
Learn more about CIS BenchmarkRecent versions available for CIS Benchmark:
CIS-CAT Pro
Scan your systems against this CIS Benchmark to easily identify your conformance to the secure configuration recommendations.
Learn more about CIS-CAT ProNot a CIS SecureSuite member yet?
Apply for membershipRecent versions available for CIS-CAT Pro:
Build Kits
Automate your hardening efforts for Red Hat Enterprise Linux using Group Policy Objects (GPOs) for Microsoft Windows and Bash shell scripts for Unix and Linux environments.
Download CIS Build KitsNot a CIS SecureSuite member yet?
Apply for membershipRecent versions available for CIS Build Kits:
CIS Hardened Images
Virtual machine (VM) images that are pre-configured to meet the robust security recommendations of the associated CIS Red Hat Enterprise Linux Benchmark.
Available CIS Hardened ImagesRecent versions available for CIS Hardened Images:
Explore CIS Benchmarks Resources
CIS Benchmarks Community
Collaborate with SMEs, implementers, and other cybersecurity practitioners from around the world to help secure Red Hat Enterprise Linux
Join A CommunityEffective Implementation of the CIS Benchmarks
Learn how CIS SecureSuite tools and resources help automate the assessment and implementation of CIS Benchmarks to meet security best practices.
Register For A Webinar Today