1.1.10.2. Encryption for Password Protected Office 97-2003 Files | CIS MS Office 2007 v1.1.0 L2 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
1.3 Unix Run in Chroot - @SYSCONFDIR@/my.cnf | CIS MySQL 4.1/5.1 OS L1 v1.0.2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.3 Unix Run in Chroot - /etc/my.cnf | CIS MySQL 4.1/5.1 OS L1 v1.0.2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.3 Unix Run in Chroot - /etc/mysql/my.cnf | CIS MySQL 4.1/5.1 OS L1 v1.0.2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1 FTP User Isolation | CIS IIS 6.0 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.3.2 RedHat bind-chroot Rpm 'ROOTDIR' | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
9 - Isolate BIND via chroot or Solaris Zones | BIND - TNS BIND Best Practices Audit v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001360 - Kubernetes must separate user functionality. | DISA STIG Kubernetes v1r11 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Define and Categorize Assets on AWS | Tenable AWS Best Practice Audit | amazon_aws | SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeAccountAttributes - 'maximum security groups per interface' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeAddresses - 'Review list of interface assignments and private IPs' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeInstances - 'Verify the security group of instances in the VPC' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeNetworkAcls - 'Review list of network ACLs' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribePlacementGroups - 'Placement groups currently in use' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribePlacementGroups - 'Placement groups deleted or deleting' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribePlacementGroups - 'Placement groups pending' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeSecurityGroups - 'Review security groups' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeSubnets - 'Current subnet list' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EC2: DescribeSubnets - 'Default subnets' | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
EPAS-00-005100 - The EDB Postgres Advanced Server must separate user functionality (including user interface services) from database management functionality. | EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
MADB-10-004600 - MariaDB must separate user functionality (including user interface services) from database management functionality. | DISA MariaDB Enterprise 10.x v1r3 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
MD4X-00-000700 - MongoDB must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). | DISA STIG MongoDB Enterprise Advanced 4.x v1r3 DB | MongoDB | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
MYS8-00-006400 - The MySQL Database Server 8.0 must separate user functionality (including user interface services) from database management functionality. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
Shared Responsibility Model for Abstracted Services | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Shared Responsibility Model for Container Services | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Shared Responsibility Model for Infrastructure Services | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Understanding the AWS Secure Global Infrastructure | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
WBSP-AS-001390 - The WebSphere Application Servers must not be in the DMZ. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WBSP-AS-001390 - The WebSphere Application Servers must not be in the DMZ. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |