Item Search

NameAudit NamePluginCategory
1.1.1.3 Ensure hfsplus kernel module is not availableCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.1.2 Ensure nodev option set on /tmp partitionCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.2.3 Ensure nosuid option set on /dev/shm partitionCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.2.7.1 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.4.1.1 Ensure SELinux is installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.8 Ensure kernel.randomize_va_space is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.6.1 Ensure message of the day is configured properlyCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.8 Ensure message access server services are not in useCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.11 Ensure print server services are not in useCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.16 Ensure tftp server services are not in useCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.17 Ensure web proxy server services are not in useCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.3.3 Ensure nis client is not installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.3.5 Ensure tftp client is not installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.1.1 Ensure IPv6 status is identifiedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.1.1 Ensure net.ipv4.ip_forward is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.2.3 Ensure net.ipv6.conf.all.accept_redirects is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.2.4 Ensure net.ipv6.conf.default.accept_redirects is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

5.2.4 Ensure sshd access is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.5 Ensure sshd Banner is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

5.2.16 Ensure sshd MaxAuthTries is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.3.3 Ensure sudo log file existsCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.4.2.2.5 Ensure password same consecutive characters is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.4.2.3.3 Ensure password history is enforced for the root userCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.1 Ensure password expiration is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

5.5.1.3 Ensure password expiration warning days is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.5 Ensure inactive password lock is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.6 Ensure all users last password change date is in the pastCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.5.2.3 Ensure group root is the only GID 0 groupCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

5.5.2.7 Ensure system accounts do not have a valid login shellCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.3.3 Ensure default user umask is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

6.1.1.1 Ensure journald service is activeCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1.2 Ensure systemd-journal-remote service is not in useCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

6.1.1.5 Ensure journald ForwardToSyslog is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.1.6 Ensure journald log file rotation is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.2.1 Ensure rsyslog is installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

6.1.2.3 Ensure rsyslog log file creation mode is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.1.2.5 Ensure rsyslog is configured to send logs to a remote log hostCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.2.7 Ensure logrotate is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.3.1 Ensure access to all logfiles has been configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.1 Ensure AIDE is installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

7.1.2 Ensure access to /etc/passwd- is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.3 Ensure access to /etc/group is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.5 Ensure access to /etc/shadow is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.7 Ensure access to /etc/gshadow is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.8 Ensure access to /etc/gshadow- is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.10 Ensure access to /etc/security/opasswd is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.13 Ensure SUID and SGID files are reviewedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

7.2.5 Ensure no duplicate GIDs existCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

7.2.8 Ensure local interactive user home directories are configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

IISW-SI-000242 - The IIS 8.5 private website must employ cryptographic mechanisms (TLS) and require client certificates.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION