| 2.1.1 Backup Policy in Place | CONTINGENCY PLANNING | 
| 2.1.2 Verify Backups are Good | CONTINGENCY PLANNING | 
| 2.1.3 Secure Backup Credentials | ACCESS CONTROL, CONTINGENCY PLANNING, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 2.1.4 The Backups Should be Properly Secured | CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 2.1.6 Disaster Recovery (DR) Plan | CONTINGENCY PLANNING | 
| 2.1.7 Backup of Configuration and Related Files | CONTINGENCY PLANNING | 
| 2.2 Dedicate the Machine Running MariaDB | SYSTEM AND COMMUNICATIONS PROTECTION | 
| 2.4 Do Not Reuse Usernames | ACCESS CONTROL | 
| 2.6 Ensure 'password_lifetime' is Less Than or Equal to '365' | IDENTIFICATION AND AUTHENTICATION | 
| 4.2 Ensure Example or Test Databases are Not Installed on Production Servers | PLANNING, SYSTEM AND SERVICES ACQUISITION | 
| 4.4 Harden Usage for 'local_infile' on MariaDB Clients | CONFIGURATION MANAGEMENT | 
| 4.6 Ensure Symbolic Links are Disabled | PLANNING, SYSTEM AND SERVICES ACQUISITION | 
| 4.7 Ensure the 'secure_file_priv' is Configured Correctly | ACCESS CONTROL, MEDIA PROTECTION | 
| 5.1 Ensure Only Administrative Users Have Full Database Access | ACCESS CONTROL | 
| 5.2 Ensure 'FILE' is Not Granted to Non-Administrative Users | ACCESS CONTROL | 
| 5.4 Ensure 'SUPER' is Not Granted to Non-Administrative Users | ACCESS CONTROL | 
| 5.5 Ensure 'SHUTDOWN' is Not Granted to Non-Administrative Users | ACCESS CONTROL | 
| 5.6 Ensure 'CREATE USER' is Not Granted to Non-Administrative Users | ACCESS CONTROL | 
| 5.7 Ensure 'GRANT OPTION' is Not Granted to Non-Administrative Users | ACCESS CONTROL | 
| 5.8 Ensure 'REPLICATION SLAVE' is Not Granted to Non-Administrative Users | ACCESS CONTROL, MEDIA PROTECTION | 
| 5.9 Ensure DML/DDL Grants are Limited to Specific Databases and Users | ACCESS CONTROL, MEDIA PROTECTION | 
| 5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKER | PLANNING, SYSTEM AND SERVICES ACQUISITION | 
| 6.1 Ensure 'log_error' is configured correctly | AUDIT AND ACCOUNTABILITY | 
| 6.2 Ensure Log Files are Stored on a Non-System Partition | AUDIT AND ACCOUNTABILITY | 
| 6.5 Ensure the Audit Plugin Can't be Unloaded | AUDIT AND ACCOUNTABILITY | 
| 7.1 Disable use of the mysql_old_password plugin | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 7.3 Ensure strong authentication is utilized for all accounts | IDENTIFICATION AND AUTHENTICATION | 
| 7.4 Ensure Password Complexity Policies are in Place | IDENTIFICATION AND AUTHENTICATION | 
| 7.5 Ensure No Users Have Wildcard Hostnames | ACCESS CONTROL, MEDIA PROTECTION | 
| 7.6 Ensure No Anonymous Accounts Exist | ACCESS CONTROL | 
| 8.1 Ensure 'require_secure_transport' is Set to 'ON' and 'have_ssl' is Set to 'YES' | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 8.2 Ensure 'ssl_type' is Set to 'ANY', 'X509', or 'SPECIFIED' for All Remote Users | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 8.3 Set Maximum Connection Limits for Server and per User | SYSTEM AND COMMUNICATIONS PROTECTION | 
| 9.1 Ensure Replication Traffic is Secured | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION | 
| 9.2 Ensure 'MASTER_SSL_VERIFY_SERVER_CERT' is enabled | CONFIGURATION MANAGEMENT | 
| 9.3 Ensure 'super_priv' is Not Set to 'Y' for Replication Users | ACCESS CONTROL | 
| 9.5 Ensure mutual TLS is enabled | CONFIGURATION MANAGEMENT | 
| CIS_MariaDB_10.6_Benchmark_v1.1.0_L1_Database.audit from CIS MariaDB 10.6 Benchmark |  |