Let's take a practical example to explore CIS Benchmarks in greater detail by looking at the one for RHEL 7. At the time of writing, this is on release version 2.2.0 and consists of 386 pages! Thus, immediately we can see that implementing this benchmark is unlikely to be a trivial activity.
As you explore the document, you will find that the section of most interest to us—the Recommendations section—is divided into subsections. Each of these focuses on a specific area of security within the operating system. At the time of writing, section 1 is all about the initial setup of the operating system; parameters and configuration likely to be applied at build time. Section 2 is all about securing common services ...