These are a set of rules for a Linux system with the audit package installed. These rules are compliant with the Center for Internet Security (CIS) Red Hat 6 Benchmark. These rules will give sufficient coverage to improve the security monitoring of a system