1.2.2 Ensure GPG keys are configured | CIS SUSE Linux Enterprise Server 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS SUSE Linux Enterprise Server 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - 'passwd_pbkdf2' | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - password_pbkdf2 | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - superusers | CIS SUSE Linux Enterprise Server 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - superusers | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.6.2.1 Ensure AppArmor is not disabled in bootloader configuration | CIS Ubuntu Linux 14.04 LTS Server L2 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1.1 Secure Installation via ISC Source | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.3.3 Ensure IPv6 is disabled | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.1.3 Ensure auditing for processes that start prior to auditd is enabled | CIS Amazon Linux v2.0.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian 10 Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian 10 Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Amazon Linux v2.0.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian Linux 11 v2.0.0 L2 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.13 Secure the GRUB Menu - Check if 'lock' command is set after failsafe section | CIS Solaris 10 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.13 Secure the GRUB Menu - should pass if /boot/grub/menu.lst permissions are OK. | CIS Solaris 10 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
18.4.7 (L1) Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.1 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2019 STIG v2.0.0 NG MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 STIG v1.0.0 NG DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 STIG v1.0.0 NG MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure Secure Boot Level Set to Full | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure Secure Boot Level Set to Full | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure Secure Boot Level Set to Full | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Check for signatures on downloaded programs | MSCT Windows 10 v1903 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Configures LSASS to run as a protected process | MSCT Windows 11 v22H2 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
ESXi : verify-acceptance-level-accepted | VMWare vSphere 6.0 Hardening Guide | VMware | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure Secure Boot Level Set to Full | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
NET0760 - Configuration auto-loading must be disabled - 'service config' | DISA STIG Cisco Perimeter Router v8r8 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
Turn On Virtualization Based Security - ConfigureSystemGuardLaunch | MSCT Windows Server 1903 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Turn On Virtualization Based Security - EnableVirtualizationBasedSecurity | MSCT Windows 10 v1903 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Turn On Virtualization Based Security - HVCIMATRequired | MSCT Windows Server 1903 DC v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Turn On Virtualization Based Security - RequirePlatformSecurityFeatures | MSCT Windows Server 1903 DC v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Turn On Virtualization Based Security - RequirePlatformSecurityFeatures | MSCT Windows Server 1903 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |