Item Search

NameAudit NamePluginCategory
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
2.1 Secure the DB2 Runtime LibraryCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
2.2 Secure the database container directoryCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
2.2 Secure the database container directoryCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1 Restrict Core Dumps to Protected Directory - /var/coresCIS Solaris 11 L1 v1.1.0Unix
3.1 Restrict Core Dumps to Protected Directory - /var/share/coresCIS Solaris 11.1 L1 v1.0.0Unix
3.1.5 Secure permissions for default database file pathCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
3.1.5 Secure permissions for default database file path (Scored)CIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.9 Require instance name for discovery requestsCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB
3.1.12 Enable instance health monitoringCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB
3.1.12 Enable instance health monitoringCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.13 Retain fenced model processesCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.2 Restrict Core Dumps to Protected Directory - Check if permissions for /var/cores are OK.CIS Solaris 10 L1 v5.2Unix
3.2.1 TCP/IP service name - svcenameCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.3.6 Secure the JDK 64-bit runtime library - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows
3.4 Control access to audit records - /etc/security/audit_controlCIS Apple macOS 10.12 L1 v1.2.0Unix
3.5 Control access to audit records - /etc/security/audit_controlCIS Apple macOS 10.13 L1 v1.1.0Unix
4.5 Enable Login Records - Check if permissions for /var/adm/loginlog are OK.CIS Solaris 10 L1 v5.2Unix
4.8 Enable System Accounting - Check for files in /var/adm/saCIS Solaris 10 L1 v5.2Unix
8.7 Secure the permissions of the IBMLDAPSecurity.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
8.7 Secure the permissions of the IBMLDAPSecurity.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
9.9 Secure plug-in library locations - clientCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.9 Secure plug-in library locations - serverCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.11 Ensure permissions on communication exit library locationsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
11.3 Samba: Set Group Ownership of smb.conf FileCIS Solaris 10 L2 v5.2Unix
11.4 Samba: Set Secure Permissions on smbpasswd FileCIS Solaris 10 L2 v5.2Unix
11.5 Samba: Set Group Ownership of smbpasswd FileCIS Solaris 10 L2 v5.2Unix
11.6 Samba: Set Secure smb.conf File Options - ownerCIS Solaris 10 L2 v5.2Unix
11.8 sendmail: Set Secure Permissions on Log FileCIS Solaris 10 L2 v5.2Unix
Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeWindows
Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeUnix
File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best PracticeUnix
XenServer - All network interfaces are operating in full-duplex modeTNS Citrix XenServerUnix
XenServer - Host is enabledTNS Citrix XenServerUnix
XenServer - Use a static IP on the management network interfaceTNS Citrix XenServerUnix